<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9"
        xmlns:image="http://www.google.com/schemas/sitemap-image/1.1"><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41355/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/threats/threats-055.png</image:loc>
      <image:title>OpenShell Mirror Mode Allows Arbitrary Code Execution</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41353/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/threats/threats-048.png</image:loc>
      <image:title>OpenClaw: High-Severity Access Control Bypass Looms</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41352/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/vulnerability/vulnerability-018.png</image:loc>
      <image:title>OpenClaw RCE: Paired Nodes Bypass Auth, Allow Arbitrary Commands</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41349/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/threats/threats-043.png</image:loc>
      <image:title>OpenClaw LLM Agent Bypass: Silent Execution Approval Disabled</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41347/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/news/news-017.png</image:loc>
      <image:title>OpenClaw CSRF Vulnerability: High-Severity Risk in Trusted-Proxy Deployments</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41342/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/threats/threats-002.png</image:loc>
      <image:title>OpenClaw Authentication Bypass Poses Remote Onboarding Risk</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41336/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/news/news-030.png</image:loc>
      <image:title>OpenClaw Vulnerability: Arbitrary Code Execution via .env File Override</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-35431/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/tools/tools-033.png</image:loc>
      <image:title>Critical SSRF in Microsoft Entra ID Entitlement Management</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-33819/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/threats/threats-015.png</image:loc>
      <image:title>Critical Deserialization RCE in Microsoft Bing (CVE-2026-33819)</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-33102/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/tools/tools-024.png</image:loc>
      <image:title>M365 Copilot Critical Open Redirect Allows Privilege Escalation</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-32210/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/threats/threats-037.png</image:loc>
      <image:title>Critical SSRF in Microsoft Dynamics 365 Poses Spoofing Risk</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-32172/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/vulnerability/vulnerability-010.png</image:loc>
      <image:title>Microsoft Power Apps Vulnerability Allows Remote Code Execution</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-26210/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/threats/threats-026.png</image:loc>
      <image:title>Critical KTransformers Unsafe Deserialization Vulnerability (CVE-2026-26210)</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-26150/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/tools/tools-014.png</image:loc>
      <image:title>Microsoft Purview SSRF: Privilege Escalation Risk</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-24303/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/vulnerability/vulnerability-025.png</image:loc>
      <image:title>Critical Privilege Escalation in Microsoft Partner Center</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/hackers-exploit-file-upload-bug-in-breeze-cache-wordpress-pl-htqmk/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/threats/threats-025.png</image:loc>
      <image:title>Breeze Cache Plugin Exploit: Unauthenticated File Upload Hits WordPress</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6942/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/threats/threats-039.png</image:loc>
      <image:title>Critical RCE Flaw in radare2-mcp: Command Injection via JSON-RPC</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6941/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/threats/threats-024.png</image:loc>
      <image:title>CVE-2026-6941 — Its Project Notes Handling That Path Traversal</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6940/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/threats/threats-027.png</image:loc>
      <image:title>Radare2 Path Traversal Flaw: Local Attackers Can Delete Arbitrary Directories</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-28525/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/vulnerability/vulnerability-036.png</image:loc>
      <image:title>CVE-2026-28525 — The Multipart Upload Parser In Mongoose_multipart.C That Denial of Service</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/frontier-ai-and-the-future-of-defense-your-top-questions-an-1z8qk/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/news/news-050.png</image:loc>
      <image:title>Frontier AI: CISO Questions and Defensive Realities</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41272/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/vulnerability/vulnerability-027.png</image:loc>
      <image:title>Flowise SSRF Bypass: DNS Rebinding Opens LLM Flows to Attackers</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41271/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/threats/threats-052.png</image:loc>
      <image:title>Flowise SSRF Vulnerability Exposes Internal Systems</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41270/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/news/news-033.png</image:loc>
      <image:title>Flowise SSRF Bypass: Internal Network at Risk</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41269/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/news/news-001.png</image:loc>
      <image:title>Flowise RCE via Malicious JavaScript Uploads</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41268/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/tools/tools-052.png</image:loc>
      <image:title>Flowise RCE: Unauthenticated Command Execution</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41267/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/news/news-023.png</image:loc>
      <image:title>Flowise Cloud Vulnerability Exposes Multi-Tenant Environments</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41138/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/news/news-005.png</image:loc>
      <image:title>Flowise RCE: Unchecked Input Leads to Code Execution</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/us-sanctions-cambodian-senator-for-millions-earned-through-s-h3to2/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/vulnerability/vulnerability-035.png</image:loc>
      <image:title>US Sanctions Cambodian Senator for Massive Scam Compound Operations</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/daily-digest/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/vulnerability/vulnerability-006.png</image:loc>
      <image:title>Daily Security Digest — 2026-04-23</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41246/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/threats/threats-047.png</image:loc>
      <image:title>Contour Kubernetes Ingress: Lua Code Injection Leads to Envoy RCE</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41241/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/threats/threats-055.png</image:loc>
      <image:title>Pretalx XSS: Organizer Search Exposes User Data</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41213/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/threats/threats-030.png</image:loc>
      <image:title>CVE-2026-41213 — @node-oauth/oauth2-server is a module for implementing an</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41173/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/tools/tools-018.png</image:loc>
      <image:title>CVE-2026-41173 — The AWS X-Ray Remote Sampler package provides a sampler</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41078/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/tools/tools-007.png</image:loc>
      <image:title>CVE-2026-41078 — Denial of Service</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-40894/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/vulnerability/vulnerability-037.png</image:loc>
      <image:title>CVE-2026-40894 — Denial of Service</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-40886/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/vulnerability/vulnerability-014.png</image:loc>
      <image:title>Argo Workflows Crash Loop: Malformed Annotation Halts Processing</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-31173/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/vulnerability/vulnerability-055.png</image:loc>
      <image:title>CVE-2026-31173 — ToToLink A3300R Firmware Vulnerability</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-31169/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/tools/tools-021.png</image:loc>
      <image:title>CVE-2026-31169 — ToToLink A3300R Firmware Vulnerability</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-31168/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/news/news-043.png</image:loc>
      <image:title>CVE-2026-31168 — ToToLink A3300R Firmware Vulnerability</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-31167/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/vulnerability/vulnerability-007.png</image:loc>
      <image:title>CVE-2026-31167 — ToToLink A3300R Firmware Vulnerability</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-31163/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/tools/tools-041.png</image:loc>
      <image:title>CVE-2026-31163 — ToToLink A3300R Firmware Vulnerability</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-31162/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/news/news-014.png</image:loc>
      <image:title>CVE-2026-31162 — ToToLink A3300R Firmware Vulnerability</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/cisa-us-agency-breached-through-cisco-vulnerability-firest-imlfx/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/threats/threats-025.png</image:loc>
      <image:title>CISA Breach: Cisco Vulnerability Led to Persistent Backdoor</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1542954397-4535/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/tools/tools-001.png</image:loc>
      <image:title>Firefox and Tor Browser Uniquely Vulnerable to Stable Identifier Leak</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/trigona-ransomware-attacks-use-custom-exfiltration-tool-to-s-g4igl/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/tools/tools-020.png</image:loc>
      <image:title>Trigona Ransomware Leverages Custom Data Exfiltration Tool</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/surveillance-companies-exploiting-telecom-system-to-spy-on-t-69gpn/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/news/news-018.png</image:loc>
      <image:title>Surveillance Firms Weaponize Telecom Flaws for Location Tracking</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6921/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/threats/threats-007.png</image:loc>
      <image:title>CVE-2026-6921 — Race in GPU in Google Chrome on Windows prior to</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6920/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/threats/threats-043.png</image:loc>
      <image:title>Chrome on Android GPU Vulnerability Allows Sandbox Escape</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41909/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/vulnerability/vulnerability-002.png</image:loc>
      <image:title>CVE-2026-41909 — Paired-Device Pairing Management That Vulnerability</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41908/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/tools/tools-009.png</image:loc>
      <image:title>CVE-2026-41908 — The Assistant-Media Route That Vulnerability</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-40891/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/vulnerability/vulnerability-040.png</image:loc>
      <image:title>CVE-2026-40891 — Denial of Service</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-40182/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/vulnerability/vulnerability-051.png</image:loc>
      <image:title>CVE-2026-40182 — OpenTelemetry dotnet is a dotnet telemetry framework. From</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-31179/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/tools/tools-054.png</image:loc>
      <image:title>CVE-2026-31179 — ToToLink A3300R Firmware Vulnerability</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-31176/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/tools/tools-039.png</image:loc>
      <image:title>CVE-2026-31176 — ToToLink A3300R Firmware Vulnerability</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-31159/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/tools/tools-040.png</image:loc>
      <image:title>CVE-2026-31159 — ToToLink A3300R Firmware Vulnerability</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/unc6692-impersonates-it-helpdesk-via-microsoft-teams-to-depl-khwgm/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/vulnerability/vulnerability-031.png</image:loc>
      <image:title>UNC6692 Impersonates IT Helpdesk via Microsoft Teams with SNOW Malware</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1427288221-8813/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/news/news-046.png</image:loc>
      <image:title>Bitwarden CLI npm Package Briefly Compromised in Supply Chain Attack</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41239/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/threats/threats-036.png</image:loc>
      <image:title>CVE-2026-41239 — Cross-Site Scripting (XSS)</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41238/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/tools/tools-032.png</image:loc>
      <image:title>CVE-2026-41238 — Cross-Site Scripting (XSS)</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-40472/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/news/news-050.png</image:loc>
      <image:title>Critical XSS in hackage-server via Malicious .cabal Metadata</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-40471/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/threats/threats-009.png</image:loc>
      <image:title>Critical CSRF Flaw in hackage-server Poses Supply Chain Risk</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-40470/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/tools/tools-043.png</image:loc>
      <image:title>Critical XSS in Hackage Server Exposes User Sessions</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-34003/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/news/news-009.png</image:loc>
      <image:title>X.Org X Server Flaw: Local Attackers Exploit OOB Memory Access</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-34001/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/threats/threats-011.png</image:loc>
      <image:title>X.Org Server Flaw: Use-After-Free Threatens Linux Desktops</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-33999/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/threats/threats-032.png</image:loc>
      <image:title>X.Org Server Underflow: Local RCE and DoS Risk</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-23751/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/news/news-003.png</image:loc>
      <image:title>Critical Kofax Capture RCE Vulnerability: Unauthenticated Access to Files and NTLMv2 Coercion</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2025-62373/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/news/news-004.png</image:loc>
      <image:title>Critical RCE in Pipecat Python Framework: CVE-2025-62373</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/new-checkmarx-supply-chain-breach-affects-kics-analysis-tool-g75f0/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/vulnerability/vulnerability-019.png</image:loc>
      <image:title>Checkmarx KICS Supply Chain Compromise Exposes Developer Data</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/china-linked-hackers-targeted-mongolian-government-using-sla-5p8mn/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/vulnerability/vulnerability-018.png</image:loc>
      <image:title>China-Linked GopherWhisper APT Targets Mongolian Government via Slack, Discord</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/bitwarden-cli-compromised-in-ongoing-checkmarx-supply-chain-9hrc5/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/tools/tools-047.png</image:loc>
      <image:title>Bitwarden CLI Compromised in Checkmarx Supply Chain Attack</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/house-republicans-unveil-data-privacy-law-that-would-overrid-6hpr2/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/threats/threats-039.png</image:loc>
      <image:title>House Republicans Unveil Federal Data Privacy Bill, Threatening State Laws</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/threatsday-bulletin-290m-defi-hack-macos-lotl-abuse-prox-82xp3/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/tools/tools-050.png</image:loc>
      <image:title>Supply Chain Exploits &amp; DeFi Hacks: Old Bugs, New Targets</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-39440/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/vulnerability/vulnerability-008.png</image:loc>
      <image:title>Critical Code Injection Flaw in FunnelFormsPro Exposes Remote Execution Risk</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2025-66286/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/threats/threats-005.png</image:loc>
      <image:title>CVE-2025-66286 — An API design flaw in WebKitGTK and WPE WebKit allows</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2025-13763/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/threats/threats-054.png</image:loc>
      <image:title>CVE-2025-13763 — Information Disclosure</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/medical-data-of-500-000-britons-put-up-for-sale-on-chinese-w-y9bmc/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/tools/tools-031.png</image:loc>
      <image:title>UK Biobank Data Leaked, Found on Chinese E-commerce Site</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-28040/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/tools/tools-004.png</image:loc>
      <image:title>CVE-2026-28040 — Magepeople Inc. Taxi Booking Manager For WooCommerce Cross-Site Scripting (XSS)</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2025-62110/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/tools/tools-052.png</image:loc>
      <image:title>CVE-2025-62110 — Rescue Themes Rescue Shortcodes Cross-Site Scripting (XSS)</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2025-62104/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/news/news-020.png</image:loc>
      <image:title>CVE-2025-62104 — Navneil Naicker ACF Galerie Vulnerability</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1427288221-8808/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/vulnerability/vulnerability-005.png</image:loc>
      <image:title>Cyera Acquires Ryft for Over $100M in Israeli Cybersecurity Exit</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/webinar-mythos-reality-check-beating-automated-exploitati-bewj5/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/news/news-022.png</image:loc>
      <image:title>AI Accelerates Exploitation: The Collapsing Exploit Window</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/incd-alert_1991/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1573164713988-8665fc963095?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Supply Chain Attack Targets Checkmarx Software Packages</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/project-glasswing-proved-ai-can-find-the-bugs-who-s-going-t-2j29a/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/vulnerability/vulnerability-052.png</image:loc>
      <image:title>AI Finds Bugs Fast: Anthropic&apos;s Project Glasswing Fuels Pre-Emptive Patching</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/cisa-orders-feds-to-patch-bluehammer-flaw-exploited-as-zero-1vinf/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/threats/threats-040.png</image:loc>
      <image:title>CISA Mandates Patching of Zero-Day Microsoft Defender Flaw</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/luxury-cosmetics-giant-rituals-discloses-data-breach-62bg3/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/tools/tools-044.png</image:loc>
      <image:title>Luxury Cosmetics Giant Rituals Discloses Data Breach</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6903/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/tools/tools-053.png</image:loc>
      <image:title>LabOne Web Server Suffers Arbitrary File Read Flaw</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6887/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/news/news-052.png</image:loc>
      <image:title>Critical SQL Injection in End-of-Life Borg SPM 2007</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6886/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/tools/tools-015.png</image:loc>
      <image:title>Critical Authentication Bypass in End-of-Life Borg SPM 2007</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6885/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/threats/threats-020.png</image:loc>
      <image:title>Critical Borg SPM 2007 Vulnerability Allows Unauthenticated Remote Code Execution</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-5464/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/tools/tools-017.png</image:loc>
      <image:title>WordPress Plugin Flaw Allows Arbitrary Plugin Installation and RCE</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-3960/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/vulnerability/vulnerability-034.png</image:loc>
      <image:title>CVE-2026-3960 — Remote Code Execution</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/can-ai-attack-the-cloud-lessons-from-building-an-autonomous-hzp2r/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/threats/threats-050.png</image:loc>
      <image:title>AI Unleashed: Autonomous Cloud Attacks Now a Reality, Unit 42 Warns</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/zealot-shows-what-ai-s-capable-of-in-staged-cloud-attack-9bg9b/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/vulnerability/vulnerability-029.png</image:loc>
      <image:title>Zealot AI: Cloud Attacks Outpace Human Defenders</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/china-linked-gopherwhisper-infects-12-mongolian-government-s-comgi/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/tools/tools-002.png</image:loc>
      <image:title>GopherWhisper APT Targets Mongolian Government with Go Backdoors</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/lockdown-lab/lockdown-win-002/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/lockdown/lockdown-cover.png</image:loc>
      <image:title>Enforce account lockout policy</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/vercel-finds-more-compromised-accounts-in-context-ai-linked-y5lpa/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/threats/threats-022.png</image:loc>
      <image:title>Vercel Confirms Additional Customer Accounts Compromised in Context.ai Breach</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/recent-microsoft-defender-vulnerability-exploited-as-zero-da-dn3vq/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/tools/tools-024.png</image:loc>
      <image:title>Zero-Day Flaw in Microsoft Defender Leveraged by Attackers</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41040/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/tools/tools-021.png</image:loc>
      <image:title>GROWI ReDoS Vulnerability (CVE-2026-41040) Poses High DoS Risk</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-34488/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/news/news-006.png</image:loc>
      <image:title>IP Setting Software Vulnerability Allows Arbitrary Code Execution</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41990/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/threats/threats-004.png</image:loc>
      <image:title>CVE-2026-41990 — Libgcrypt before 1.12.2 mishandles Dilithium signing.</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41989/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/vulnerability/vulnerability-048.png</image:loc>
      <image:title>CVE-2026-41989 — Buffer Overflow</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41233/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/threats/threats-052.png</image:loc>
      <image:title>CVE-2026-41233 — Froxlor is open source server administration software.</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41232/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/tools/tools-014.png</image:loc>
      <image:title>CVE-2026-41232 — Froxlor is open source server administration software.</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-40529/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/tools/tools-007.png</image:loc>
      <image:title>CVE-2026-40529 — SQL Injection</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1427288221-8806/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/vulnerability/vulnerability-032.png</image:loc>
      <image:title>Physical Manipulation Spoofs Data for $34,000 Payout</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1542954397-4531/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/news/news-025.png</image:loc>
      <image:title>Iran Claims US Exploited Network Gear Backdoors</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41231/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/tools/tools-034.png</image:loc>
      <image:title>Froxlor Vulnerability Grants Root Ownership of Arbitrary Directories</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41230/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/tools/tools-028.png</image:loc>
      <image:title>Froxlor Critical Flaw Allows Arbitrary DNS Record Injection</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41229/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/news/news-023.png</image:loc>
      <image:title>Froxlor Critical RCE: Unsanitized Admin Input Leads to Persistent Code Execution</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41228/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/tools/tools-040.png</image:loc>
      <image:title>Critical Froxlor Bug: Authenticated Code Execution via Language File Path Traversal</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-3361/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/news/news-038.png</image:loc>
      <image:title>CVE-2026-3361 — Cross-Site Scripting (XSS)</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-3007/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/vulnerability/vulnerability-041.png</image:loc>
      <image:title>CVE-2026-3007 — Cross-Site Scripting (XSS)</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1707304340-2286/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/news/news-042.png</image:loc>
      <image:title>Apple Patches Critical Notification Data Leak Vulnerability</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-3844/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/news/news-041.png</image:loc>
      <image:title>Critical RCE Flaw in Breeze Cache WordPress Plugin</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-2951/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/threats/threats-003.png</image:loc>
      <image:title>CVE-2026-2951 — Cross-Site Scripting (XSS)</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41679/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/tools/tools-020.png</image:loc>
      <image:title>Critical RCE in Paperclip AI Orchestration Platform (CVE-2026-41679)</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41208/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/vulnerability/vulnerability-006.png</image:loc>
      <image:title>CVE-2026-41208: Paperclip AI Agent Privilege Escalation to RCE</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41182/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/tools/tools-010.png</image:loc>
      <image:title>CVE-2026-41182 — LangSmith Client SDKs provide SDK&apos;s for interacting with</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41180/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/vulnerability/vulnerability-004.png</image:loc>
      <image:title>PsiTransfer RCE: Unauthenticated Code Execution via Path Traversal</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-1923/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/news/news-021.png</image:loc>
      <image:title>CVE-2026-1923 — Cross-Site Scripting (XSS)</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6878/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/vulnerability/vulnerability-025.png</image:loc>
      <image:title>CVE-2026-6878 — ByteDance Verl Vulnerability</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6874/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/tools/tools-033.png</image:loc>
      <image:title>CVE-2026-6874 — A vulnerability was determined in ericc-ch copilot-api up</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-5935/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/news/news-029.png</image:loc>
      <image:title>IBM Storage Console Flaw: Unauthenticated RCE Risk</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-5926/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/threats/threats-047.png</image:loc>
      <image:title>CVE-2026-5926 — IBM Verify Identity Access Container 11.0 through 11.0.2</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-4919/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/tools/tools-049.png</image:loc>
      <image:title>CVE-2026-4919 — Cross-Site Scripting (XSS)</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-4918/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/news/news-003.png</image:loc>
      <image:title>CVE-2026-4918 — Cross-Site Scripting (XSS)</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-4917/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/tools/tools-001.png</image:loc>
      <image:title>CVE-2026-4917 — Arbitrary File Access</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-40062/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/threats/threats-023.png</image:loc>
      <image:title>Ziostation2 Path Traversal Exposes Sensitive OS Info</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-3621/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/vulnerability/vulnerability-021.png</image:loc>
      <image:title>IBM WebSphere Liberty Identity Spoofing: High-Severity Vulnerability</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-32679/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/threats/threats-029.png</image:loc>
      <image:title>CVE-2026-32679: DLL Hijacking in LiveOn Meet and Canon Camera Installers</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-1352/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/vulnerability/vulnerability-047.png</image:loc>
      <image:title>CVE-2026-1352 — Denial of Service</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-1274/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/threats/threats-024.png</image:loc>
      <image:title>CVE-2026-1274 — IBM Guardium Data Protection 12.0, 12.1, and 12.2 is</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2025-36074/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/vulnerability/vulnerability-020.png</image:loc>
      <image:title>CVE-2025-36074 — IBM Security Verify Directory (Container) 10.0.0 through</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41455/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/threats/threats-044.png</image:loc>
      <image:title>WeKan SSRF Vulnerability: Internal Network Exposure Risk</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41454/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/tools/tools-043.png</image:loc>
      <image:title>Wekan API Flaw Grants Board Members Admin Powers</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41177/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/vulnerability/vulnerability-011.png</image:loc>
      <image:title>CVE-2026-41177 — Server-Side Request Forgery</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41175/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/tools/tools-047.png</image:loc>
      <image:title>Statamic CMS Vulnerability Allows Data Deletion via API Manipulation</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-40517/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/news/news-019.png</image:loc>
      <image:title>Radare2 Command Injection: Malicious PDB Files Execute OS Commands</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41167/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/threats/threats-028.png</image:loc>
      <image:title>Jellystat SQLi to RCE Critical Vulnerability (CVE-2026-41167)</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41166/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/tools/tools-042.png</image:loc>
      <image:title>OpenRemote Privilege Escalation: Master Realm at Risk</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-40937/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/vulnerability/vulnerability-016.png</image:loc>
      <image:title>RustFS Flaw: Non-Admin Takeover of Notification Targets</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-40882/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/threats/threats-006.png</image:loc>
      <image:title>OpenRemote XXE Flaw Exposes IoT Platforms to File Disclosure</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-34068/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/news/news-036.png</image:loc>
      <image:title>CVE-2026-34068 — nimiq-transaction provides the transaction primitive to be</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-33733/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/news/news-050.png</image:loc>
      <image:title>EspoCRM Path Traversal: Admin Creds Lead to Arbitrary File Access</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-33656/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/vulnerability/vulnerability-054.png</image:loc>
      <image:title>EspoCRM Critical Path Traversal: Admin Access Leads to Server Compromise</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/apple-fixes-ios-bug-that-retained-deleted-notification-data-r98js/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/vulnerability/vulnerability-033.png</image:loc>
      <image:title>Apple Patches iOS Notification Data Retention Flaw</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/north-korean-hackers-siphon-more-than-12-million-from-crypt-v0brf/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/vulnerability/vulnerability-013.png</image:loc>
      <image:title>North Korean Hackers Net Over $12M in Q1 2026 Crypto Scams</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/cisa-director-pick-sean-plankey-withdraws-his-nomination-ltvbs/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/threats/threats-048.png</image:loc>
      <image:title>CISA Director Nominee Sean Plankey Withdraws, Agency Faces Leadership Void</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-34066/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/tools/tools-011.png</image:loc>
      <image:title>CVE-2026-34066 — nimiq-blockchain provides persistent block storage for</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-34065/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/threats/threats-008.png</image:loc>
      <image:title>Nimiq Primitives Node Panic via Malformed BLS Key</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-34064/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/news/news-034.png</image:loc>
      <image:title>CVE-2026-34064 — nimiq-account contains account primitives to be used in</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-34063/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/news/news-009.png</image:loc>
      <image:title>Nimiq network-libp2p Crash Vulnerability: CVE-2026-34063</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-34062/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/tools/tools-015.png</image:loc>
      <image:title>CVE-2026-34062 — nimiq-libp2p is a Nimiq network implementation based on</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-33471/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/news/news-047.png</image:loc>
      <image:title>Critical Nimiq Block Vulnerability: SkipBlockProof Bypass</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/new-mirai-campaign-exploits-rce-flaw-in-eol-d-link-routers-9l6w1/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/news/news-020.png</image:loc>
      <image:title>Mirai Botnet Exploits End-of-Life D-Link Routers via RCE</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/daily-digest/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/threats/threats-027.png</image:loc>
      <image:title>Daily Security Digest — 2026-04-22</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41469/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/vulnerability/vulnerability-015.png</image:loc>
      <image:title>CVE-2026-41469 — Beghelli Sicuro24 SicuroWeb does not enforce a Content</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41468/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/tools/tools-012.png</image:loc>
      <image:title>Beghelli SicuroWeb: EOL AngularJS Exposes Operators to Session Hijacking</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41459/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/tools/tools-055.png</image:loc>
      <image:title>CVE-2026-41459 — Path Traversal</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-34415/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/tools/tools-026.png</image:loc>
      <image:title>Critical RCE in Xerte Online Toolkits: Incomplete Input Validation Opens Backdoor</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-34414/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/threats/threats-009.png</image:loc>
      <image:title>Xerte Online Toolkits Vulnerability: Path Traversal Risks Exposed</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-34413/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/vulnerability/vulnerability-035.png</image:loc>
      <image:title>Xerte Online Toolkits RCE: Unauthenticated File Operations</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-26354/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/threats/threats-025.png</image:loc>
      <image:title>Dell PowerProtect DD OS Vulnerability Exposes Data to Remote Command Execution</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1427288221-8803/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/threats/threats-018.png</image:loc>
      <image:title>Volo Protocol Loses $3.5 Million in Digital Assets</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/malicious-kics-docker-images-and-vs-code-extensions-hit-chec-9wfha/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/threats/threats-043.png</image:loc>
      <image:title>Malicious KICS Docker Images and VS Code Extensions Hijack Checkmarx Supply Chain</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1707304340-2285/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/vulnerability/vulnerability-053.png</image:loc>
      <image:title>Anthropic Claude Desktop Implants Browser Bridge, Bypassing Sandboxes</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-5816/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/news/news-023.png</image:loc>
      <image:title>GitLab XSS Flaw: Unauthenticated JavaScript Execution Risk</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-5262/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/threats/threats-055.png</image:loc>
      <image:title>GitLab Vulnerability Exposes Sensitive Tokens in Storybook</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-4922/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/tools/tools-022.png</image:loc>
      <image:title>GitLab CSRF Flaw Exposes Authenticated Users to Unauthenticated Attacks</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-35368/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/news/news-054.png</image:loc>
      <image:title>Chroot Vulnerability Allows Root Privileges via Malicious NSS Modules</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-35365/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/news/news-053.png</image:loc>
      <image:title>CVE-2026-35365 — The mv utility in uutils coreutils improperly handles</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-35352/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/vulnerability/vulnerability-050.png</image:loc>
      <image:title>TOCTOU Flaw in coreutils mkfifo: Local Privilege Escalation Risk</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-35350/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/news/news-002.png</image:loc>
      <image:title>CVE-2026-35350 — The cp utility in uutils coreutils fails to properly handle</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-35349/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/vulnerability/vulnerability-032.png</image:loc>
      <image:title>CVE-2026-35349 — The Rm Utility Of Uutils Coreutils Vulnerability</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-35341/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/threats/threats-024.png</image:loc>
      <image:title>uutils mkfifo Flaw Exposes Sensitive Files to Permission Changes</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-35338/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/news/news-003.png</image:loc>
      <image:title>chmod Bypass Threatens System Integrity: CVE-2026-35338 Detailed</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-32885/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/threats/threats-001.png</image:loc>
      <image:title>CVE-2026-32885 — DDEV is an open-source tool for running local web</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-1660/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/news/news-032.png</image:loc>
      <image:title>CVE-2026-1660 — GitLab CE/EE Affecting All Versions From 12.3 Before 18.9.6, Denial of Service</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2025-6016/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/vulnerability/vulnerability-051.png</image:loc>
      <image:title>CVE-2025-6016 — GitLab CE/EE Affecting All Versions From 9.2 Before 18.9.6,  Denial of Service</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2025-3922/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/news/news-030.png</image:loc>
      <image:title>CVE-2025-3922 — GitLab CE/EE Affecting All Versions From 12.4 Before 18.9.6, Denial of Service</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2025-0186/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/news/news-042.png</image:loc>
      <image:title>CVE-2025-0186 — GitLab CE/EE Affecting All Versions From 10.6 Before 18.9.6, Denial of Service</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-30139/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/threats/threats-053.png</image:loc>
      <image:title>CVE-2026-30139 — The AdvancedSearch Functionality Of Silverpeas Core Before V Cross-Site Scripting (XSS)</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2025-58922/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/news/news-012.png</image:loc>
      <image:title>CVE-2025-58922 — ThemeFusion Avada Vulnerability</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2024-58344/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/tools/tools-040.png</image:loc>
      <image:title>CVE-2024-58344 — Cross-Site Scripting (XSS)</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2018-25272/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/news/news-050.png</image:loc>
      <image:title>ELBA5 RCE Flaw Grants SYSTEM Access Via Database</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2018-25271/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/tools/tools-038.png</image:loc>
      <image:title>CVE-2018-25271 — Buffer Overflow</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2018-25270/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/vulnerability/vulnerability-055.png</image:loc>
      <image:title>ThinkPHP RCE Bug: Unauthenticated Attackers Exploit Critical Flaw</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2018-25269/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/vulnerability/vulnerability-044.png</image:loc>
      <image:title>CVE-2018-25269 — Cross-Site Scripting (XSS)</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2018-25268/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/threats/threats-039.png</image:loc>
      <image:title>LanSpy 2.0.1.159 Vulnerability: Local Buffer Overflow Leads to Code Execution</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2018-25267/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/news/news-010.png</image:loc>
      <image:title>CVE-2018-25267 — The Output FileName Field Of The Make CD/DVD Image Dialog Th Buffer Overflow</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2018-25266/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/threats/threats-014.png</image:loc>
      <image:title>CVE-2018-25266 — The Preferences Dialog That Buffer Overflow</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2018-25265/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/vulnerability/vulnerability-004.png</image:loc>
      <image:title>LanSpy 2.0.1.159 Vulnerability: Local Buffer Overflow Allows Code Execution</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2018-25262/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/vulnerability/vulnerability-009.png</image:loc>
      <image:title>CVE-2018-25262 — Buffer Overflow</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2018-25261/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/vulnerability/vulnerability-042.png</image:loc>
      <image:title>Iperius Backup Local Overflow: Code Execution via Malicious File Path</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2018-25260/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/vulnerability/vulnerability-018.png</image:loc>
      <image:title>MAGIX Music Editor Exploit: Local Code Execution via Buffer Overflow</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2018-25259/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/threats/threats-005.png</image:loc>
      <image:title>Old Vulnerability, New Headache: TSM 3.1 Buffer Overflow (CVE-2018-25259)</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/french-police-arrest-suspected-hacker-behind-dozens-of-data-ajdvj/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/vulnerability/vulnerability-007.png</image:loc>
      <image:title>French Authorities Arrest Hacker Behind Dozens of Breaches</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/harvester-deploys-linux-gogra-backdoor-in-south-asia-using-m-ho50d/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/news/news-052.png</image:loc>
      <image:title>Harvester&apos;s GoGra Backdoor Exploits Microsoft Graph API for Linux Targets</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/dprk-fake-job-scams-self-propagate-in-contagious-interview-mqv6m/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/threats/threats-022.png</image:loc>
      <image:title>North Korea&apos;s &apos;Contagious Interview&apos; Malware Spreads Via Compromised Dev Repos</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6862/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/threats/threats-013.png</image:loc>
      <image:title>CVE-2026-6862 — Libefiboot, A Component Of Efivar Denial of Service</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6861/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/tools/tools-044.png</image:loc>
      <image:title>CVE-2026-6861 — GNU Emacs Denial of Service</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6859/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/vulnerability/vulnerability-030.png</image:loc>
      <image:title>InstructLab Vulnerability: Remote Code Execution via Malicious HuggingFace Models</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41651/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/news/news-026.png</image:loc>
      <image:title>PackageKit Vulnerability Allows Local Privilege Escalation via TOCTOU Exploit</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-33611/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/threats/threats-020.png</image:loc>
      <image:title>CVE-2026-33611 — An operator allowed to use the REST API can cause the</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-33610/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/vulnerability/vulnerability-001.png</image:loc>
      <image:title>CVE-2026-33610 — Denial of Service</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-33609/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/threats/threats-041.png</image:loc>
      <image:title>CVE-2026-33609 — Incomplete escaping of LDAP queries when running with</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-33608/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/news/news-037.png</image:loc>
      <image:title>NVD Flags High-Severity Vulnerability: Bind Backend Configuration Exploit</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-33602/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/tools/tools-004.png</image:loc>
      <image:title>CVE-2026-33602 — Denial of Service</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-33598/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/vulnerability/vulnerability-045.png</image:loc>
      <image:title>CVE-2026-33598 — Out-of-Bounds $1</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-33595/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/tools/tools-054.png</image:loc>
      <image:title>CVE-2026-33595 — A client can trigger excessive memory allocation by</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-33594/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/news/news-007.png</image:loc>
      <image:title>CVE-2026-33594 — A client can trigger excessive memory allocation by</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-33593/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/news/news-044.png</image:loc>
      <image:title>DNSCrypt Vulnerability Allows Remote Crash via Crafted Queries</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-33254/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/news/news-043.png</image:loc>
      <image:title>CVE-2026-33254 — Denial of Service</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/china-s-cyber-capabilities-now-equal-to-the-us-warns-dutch-uqdiq/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/news/news-018.png</image:loc>
      <image:title>Dutch Intel: China&apos;s Cyber Might Now Rivals the US</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6857/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/vulnerability/vulnerability-047.png</image:loc>
      <image:title>Critical Deserialization Flaw in camel-infinispan Allows RCE</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6855/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/threats/threats-029.png</image:loc>
      <image:title>InstructLab Path Traversal Flaw Exposes Local File System</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1427288221-8802/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/vulnerability/vulnerability-048.png</image:loc>
      <image:title>Python Library xinference Compromised, TeamPCP Denies Involvement</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/new-npm-supply-chain-attack-self-spreads-to-steal-auth-token-51ws9/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/tools/tools-023.png</image:loc>
      <image:title>New npm Supply Chain Attack Steals Developer Auth Tokens</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/uk-cyber-agency-handling-four-major-incidents-a-week-as-nati-w12lq/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/threats/threats-043.png</image:loc>
      <image:title>UK Faces Barrage: Four Major Cyber Incidents Weekly, State Actors Lead Charge</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/new-defense-department-cyber-strategy-imminent-official-say-4g7g6/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/news/news-019.png</image:loc>
      <image:title>US DoD Cyber Strategy Shifts to Aggressive Posture</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/microsoft-teams-to-get-efficiency-mode-on-pcs-with-limited-r-g6ldy/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/news/news-013.png</image:loc>
      <image:title>Microsoft Teams Gets Efficiency Mode for Resource-Constrained Devices</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/cisa-kev-CVE-2026-33825/</loc>
    <image:image>
      <image:loc>https://shimiscyberworld.com/assets/images/covers/vulnerability.svg</image:loc>
      <image:title>CVE-2026-33825 — Microsoft Defender: Microsoft Defender Insufficient Granularity of Access Control Vulnerability</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/are-sboms-failing-supply-chain-attacks-rise-as-security-tea-fdvhh/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/tools/tools-036.png</image:loc>
      <image:title>SBOMs Under Scrutiny Amidst Rising Supply Chain Attacks</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/lotus-wiper-malware-targets-venezuelan-energy-systems-in-des-44k4o/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/vulnerability/vulnerability-014.png</image:loc>
      <image:title>Lotus Wiper Targets Venezuelan Energy Sector</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/toxic-combinations-when-cross-app-permissions-stack-into-ri-f4vnz/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/tools/tools-039.png</image:loc>
      <image:title>Moltbook Breach Exposes AI Agent API Tokens and OpenAI Keys</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6848/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/tools/tools-005.png</image:loc>
      <image:title>CVE-2026-6848 — Red Hat Quay Vulnerability</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-33601/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/threats/threats-025.png</image:loc>
      <image:title>CVE-2026-33601 — Denial of Service</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-33600/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/news/news-021.png</image:loc>
      <image:title>CVE-2026-33600 — Denial of Service</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-33262/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/news/news-039.png</image:loc>
      <image:title>CVE-2026-33262 — Denial of Service</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-33261/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/tools/tools-012.png</image:loc>
      <image:title>CVE-2026-33261 — Denial of Service</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-33260/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/vulnerability/vulnerability-029.png</image:loc>
      <image:title>CVE-2026-33260 — Denial of Service</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-33259/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/vulnerability/vulnerability-022.png</image:loc>
      <image:title>CVE-2026-33259 — Use-After-Free</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-33258/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/tools/tools-011.png</image:loc>
      <image:title>CVE-2026-33258 — By publishing and querying a crafted zone an attacker can</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-33257/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/vulnerability/vulnerability-016.png</image:loc>
      <image:title>CVE-2026-33257 — Denial of Service</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-33256/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/tools/tools-009.png</image:loc>
      <image:title>CVE-2026-33256 — Denial of Service</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-1930/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/tools/tools-026.png</image:loc>
      <image:title>CVE-2026-1930 — The Emailchef plugin for WordPress is vulnerable to</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-1913/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/threats/threats-028.png</image:loc>
      <image:title>CVE-2026-1913 — Cross-Site Scripting (XSS)</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-1395/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/vulnerability/vulnerability-023.png</image:loc>
      <image:title>CVE-2026-1395 — Cross-Site Scripting (XSS)</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/when-wi-fi-encryption-fails-protecting-your-enterprise-from-8aiyy/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/threats/threats-014.png</image:loc>
      <image:title>AirSnitch: New Attack Bypasses WPA2/3 Wi-Fi Encryption</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/google-antigravity-in-crosshairs-of-security-researchers-cy-2g4r8/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/vulnerability/vulnerability-027.png</image:loc>
      <image:title>Google Antigravity Vulnerability Exploited for Malware Distribution</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6846/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/tools/tools-053.png</image:loc>
      <image:title>Binutils Heap Overflow: Local Attackers Gain Code Execution via XCOFF Files</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6235/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/tools/tools-040.png</image:loc>
      <image:title>WordPress Plugin Flaw Lets Attackers Hijack Site Emails</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-5748/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/news/news-022.png</image:loc>
      <image:title>CVE-2026-5748 — Cross-Site Scripting (XSS)</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-4353/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/news/news-049.png</image:loc>
      <image:title>CVE-2026-4353 — Cross-Site Scripting (XSS)</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-4280/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/news/news-031.png</image:loc>
      <image:title>CVE-2026-4280 — Path Traversal</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-4279/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/news/news-002.png</image:loc>
      <image:title>CVE-2026-4279 — Cross-Site Scripting (XSS)</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-4132/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/news/news-015.png</image:loc>
      <image:title>WordPress HTTP Headers Plugin Flaw Opens Door to RCE</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-4125/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/threats/threats-053.png</image:loc>
      <image:title>CVE-2026-4125 — Cross-Site Scripting (XSS)</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-4119/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/tools/tools-030.png</image:loc>
      <image:title>WordPress Plugin Vulnerability Lets Subscribers Wreck Databases</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-4089/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/threats/threats-035.png</image:loc>
      <image:title>CVE-2026-4089 — Cross-Site Scripting (XSS)</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-4088/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/tools/tools-006.png</image:loc>
      <image:title>CVE-2026-4088 — Cross-Site Scripting (XSS)</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-4085/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/tools/tools-047.png</image:loc>
      <image:title>CVE-2026-4085 — Cross-Site Scripting (XSS)</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-4082/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/news/news-032.png</image:loc>
      <image:title>CVE-2026-4082 — Cross-Site Scripting (XSS)</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-4076/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/news/news-035.png</image:loc>
      <image:title>CVE-2026-4076 — Cross-Site Scripting (XSS)</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-4074/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/tools/tools-049.png</image:loc>
      <image:title>CVE-2026-4074 — Cross-Site Scripting (XSS)</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1707304340-2284/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/tools/tools-027.png</image:loc>
      <image:title>AI Unearths Hundreds of Firefox Vulnerabilities, Prompting Critical Patch</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/lockdown-lab/lockdown-lin-002/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/lockdown/lockdown-cover.png</image:loc>
      <image:title>Enforce SSH key-based authentication</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/oracle-patches-450-vulnerabilities-with-april-2026-cpu-v4uyp/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/vulnerability/vulnerability-046.png</image:loc>
      <image:title>Oracle&apos;s April CPU: 450 Patches, Over 300 Remote, Unauthenticated Flaws</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6023/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/threats/threats-039.png</image:loc>
      <image:title>Telerik UI for AJAX RadFilter Vulnerable to RCE via Deserialization</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6022/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/tools/tools-045.png</image:loc>
      <image:title>Telerik UI Vulnerability Allows Disk Space Exhaustion Attacks</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/microsoft-releases-emergency-patches-for-critical-asp-net-fl-jee71/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/threats/threats-036.png</image:loc>
      <image:title>Microsoft Rushes Patches for Critical ASP.NET Core Privilege Escalation Flaw</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/mustang-panda-s-new-lotuslite-variant-targets-india-banks-s-yax05/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/tools/tools-010.png</image:loc>
      <image:title>Mustang Panda&apos;s LOTUSLITE Variant Targets India Banks</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1427288221-8799/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/vulnerability/vulnerability-018.png</image:loc>
      <image:title>Tax Authority Phishing Campaign Targets Israelis with Fake Grants</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6840/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/vulnerability/vulnerability-007.png</image:loc>
      <image:title>CVE-2026-6840 — Missing bounds validation for operator could  allow out of</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6839/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/news/news-024.png</image:loc>
      <image:title>CVE-2026-6839 — Improper validation of STRING tensor offsets could allows</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41667/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/vulnerability/vulnerability-002.png</image:loc>
      <image:title>CVE-2026-41667 — Integer Overflow</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41666/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/threats/threats-021.png</image:loc>
      <image:title>CVE-2026-41666 — Integer Overflow</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41665/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/tools/tools-003.png</image:loc>
      <image:title>CVE-2026-41665 — Integer Overflow</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41664/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/tools/tools-032.png</image:loc>
      <image:title>CVE-2026-41664 — Integer Overflow</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-40450/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/threats/threats-045.png</image:loc>
      <image:title>CVE-2026-40450 — Integer Overflow</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-40449/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/news/news-004.png</image:loc>
      <image:title>CVE-2026-40449 — Integer Overflow</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-40448/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/news/news-045.png</image:loc>
      <image:title>CVE-2026-40448 — Integer Overflow</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/over-1-300-microsoft-sharepoint-servers-vulnerable-to-spoofi-l6882/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/news/news-043.png</image:loc>
      <image:title>Unpatched SharePoint Servers Remain Ripe for Spoofing Attacks</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-22754/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/tools/tools-052.png</image:loc>
      <image:title>Spring Security Authorization Bypass: High Severity Vulnerability</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-22753/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/vulnerability/vulnerability-009.png</image:loc>
      <image:title>Spring Security Flaw Bypasses Auth, Authorization</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-22748/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/tools/tools-038.png</image:loc>
      <image:title>CVE-2026-22748 — Spring Security: From Vulnerability</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-22747/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/threats/threats-001.png</image:loc>
      <image:title>CVE-2026-22747 — Spring Security: From Vulnerability</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-40451/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/threats/threats-035.png</image:loc>
      <image:title>CVE-2026-40451 — Cross-Site Scripting (XSS)</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6835/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/threats/threats-008.png</image:loc>
      <image:title>CVE-2026-6835 — Cross-Site Scripting (XSS)</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6834/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/tools/tools-025.png</image:loc>
      <image:title>CVE-2026-6834 — The a+HRD developed by aEnrich has a Missing Authorization</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6833/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/news/news-011.png</image:loc>
      <image:title>CVE-2026-6833 — SQL Injection</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41127/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/threats/threats-013.png</image:loc>
      <image:title>CVE-2026-41127 — BigBlueButton is an open-source virtual classroom. Versions</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41126/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/news/news-019.png</image:loc>
      <image:title>CVE-2026-41126 — Open Redirect</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41064/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/tools/tools-051.png</image:loc>
      <image:title>Critical RCE in WWBN AVideo: Incomplete Patch Leaves Open Source Platform Exposed</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41059/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/news/news-020.png</image:loc>
      <image:title>OAuth2 Proxy Bypass: Fragment Handling Exposes Protected Resources</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-40575/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/threats/threats-004.png</image:loc>
      <image:title>Critical OAuth2 Proxy Auth Bypass: CVE-2026-40575</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/french-govt-agency-confirms-breach-as-hacker-offers-to-sell-ynam1/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/vulnerability/vulnerability-016.png</image:loc>
      <image:title>French Government Agency Confirms Data Breach, Citizen Data Offered for Sale</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6823/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/news/news-013.png</image:loc>
      <image:title>HKUDS OpenHarness Default Config Exposes Systems (CVE-2026-6823)</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-40925/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/threats/threats-041.png</image:loc>
      <image:title>Critical AVideo XSS Vulnerability Exposes Admin Settings</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-40911/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/vulnerability/vulnerability-039.png</image:loc>
      <image:title>Critical RCE in AVideo YPTSocket Plugin: Unauthenticated Account Takeover</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-40906/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/tools/tools-005.png</image:loc>
      <image:title>CRITICAL SQLi in ElectricSQL: Full Database Compromise</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-40905/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/news/news-004.png</image:loc>
      <image:title>LinkAce Password Reset Flaw: Account Takeover Risk</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-34309/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/news/news-012.png</image:loc>
      <image:title>PeopleSoft Security Flaw: Critical Data at Risk via HTTP</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-34291/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/news/news-007.png</image:loc>
      <image:title>Oracle HTTP Server CVE-2026-34291: High-Severity RCE Risk</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-34287/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/vulnerability/vulnerability-032.png</image:loc>
      <image:title>Critical Oracle Identity Manager Flaw: Unauthenticated Data Compromise</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-34286/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/tools/tools-003.png</image:loc>
      <image:title>Critical Oracle Identity Manager Flaw: Unauthenticated Data Compromise</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-34285/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/threats/threats-033.png</image:loc>
      <image:title>Critical Oracle Identity Manager Flaw: Unauthenticated Data Compromise</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-34279/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/vulnerability/vulnerability-007.png</image:loc>
      <image:title>Critical RCE in Oracle Enterprise Manager Base Platform (CVE-2026-34279)</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-34275/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/tools/tools-022.png</image:loc>
      <image:title>Critical Oracle E-Business Suite Vulnerability: Full Takeover Possible</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-33519/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/news/news-037.png</image:loc>
      <image:title>Critical Esri Portal Vulnerability: Incorrect Authorization Exposes Developer Credentials</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-33518/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/tools/tools-024.png</image:loc>
      <image:title>Critical Privilege Escalation in Esri Portal for ArcGIS</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-21997/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/threats/threats-021.png</image:loc>
      <image:title>Critical Oracle Empirica Signal Flaw: Data Integrity at Risk</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6819/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/news/news-048.png</image:loc>
      <image:title>HKUDS OpenHarness Vulnerability Exposes Plugin Management to Attackers</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41320/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/news/news-027.png</image:loc>
      <image:title>CVE-2026-41320 — SQL Injection</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-40909/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/tools/tools-007.png</image:loc>
      <image:title>WWBN AVideo RCE: Path Traversal Exposes Servers to Arbitrary File Writes</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-40907/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/tools/tools-030.png</image:loc>
      <image:title>CVE-2026-40907 — WWBN AVideo is an open source video platform. In versions</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-40903/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/tools/tools-047.png</image:loc>
      <image:title>Critical ArtiPACKED Vulnerability in goshs Server Leaks GitHub Tokens</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-40890/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/tools/tools-053.png</image:loc>
      <image:title>High-Severity Go Markdown Parser Bug: CVE-2026-40890</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-40889/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/vulnerability/vulnerability-024.png</image:loc>
      <image:title>CVE-2026-40889 — Frappe HR is an open-source human resources management</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-40888/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/tools/tools-034.png</image:loc>
      <image:title>CVE-2026-40888 — Frappe HR is an open-source human resources management</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-40887/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/tools/tools-043.png</image:loc>
      <image:title>Critical SQLi in Vendure: Unauthenticated Remote Code Execution Risk</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-40884/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/vulnerability/vulnerability-031.png</image:loc>
      <image:title>Critical SFTP Auth Bypass in goshs SimpleHTTPServer</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-40879/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/vulnerability/vulnerability-035.png</image:loc>
      <image:title>Nest.js DoS via Malformed JSON: CVE-2026-40879</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-40871/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/news/news-009.png</image:loc>
      <image:title>Mailcow SQLi: Second-Order Vulnerability in Quarantine Notifications</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-40870/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/news/news-006.png</image:loc>
      <image:title>Decidim API Flaw Exposes Sensitive Participatory Data</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-40869/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/threats/threats-017.png</image:loc>
      <image:title>Decidim Flaw Allows Unauthorized Amendment Acceptance</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-40372/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/vulnerability/vulnerability-008.png</image:loc>
      <image:title>Critical ASP.NET Core Flaw: Privilege Escalation via Signature Bypass</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/daily-digest/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/news/news-030.png</image:loc>
      <image:title>Daily Security Digest — 2026-04-21</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6744/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/tools/tools-004.png</image:loc>
      <image:title>CVE-2026-6744 — Bagisto Server-Side Request Forgery</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-40868/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/vulnerability/vulnerability-011.png</image:loc>
      <image:title>Kyverno Policy Engine Flaw Leaks Service Account Tokens</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-40613/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/tools/tools-001.png</image:loc>
      <image:title>Coturn ARM64 Crash: Unauthenticated DoS via Crafted STUN Message</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-22751/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/vulnerability/vulnerability-003.png</image:loc>
      <image:title>CVE-2026-22751 — Spring Security: From Race Condition</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/exploits-turn-windows-defender-into-attacker-tool-i1q82/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/vulnerability/vulnerability-028.png</image:loc>
      <image:title>Exploits Weaponize Windows Defender Against Its Users</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41194/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/news/news-050.png</image:loc>
      <image:title>CVE-2026-41194 — FreeScout is a free self-hosted help desk and shared</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41193/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/tools/tools-027.png</image:loc>
      <image:title>FreeScout Vulnerability: Unrestricted File Write via ZIP Upload</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41192/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/tools/tools-026.png</image:loc>
      <image:title>FreeScout Attachment Flaw Allows Data Deletion</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-40611/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/threats/threats-051.png</image:loc>
      <image:title>Lego ACME Client Vulnerable to Path Traversal, Arbitrary File Write</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-40608/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/tools/tools-035.png</image:loc>
      <image:title>CVE-2026-40608 — Next AI Draw.io is a next.js web application that</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-40606/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/threats/threats-034.png</image:loc>
      <image:title>CVE-2026-40606 — mitmproxy is a interactive TLS-capable intercepting HTTP</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-40602/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/tools/tools-006.png</image:loc>
      <image:title>CVE-2026-40602 — The Home Assistant Command-line interface (hass-cli) is a</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-40594/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/vulnerability/vulnerability-015.png</image:loc>
      <image:title>CVE-2026-40594 — Race Condition</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-40588/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/news/news-021.png</image:loc>
      <image:title>BlueprintUE Vulnerability Allows Permanent Account Takeover</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-40587/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/threats/threats-025.png</image:loc>
      <image:title>CVE-2026-40587 — blueprintUE is a tool to help Unreal Engine developers.</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-5652/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/threats/threats-001.png</image:loc>
      <image:title>Critical IODR Vulnerability in Crafty Controller Puts Servers at Risk</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41191/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/news/news-026.png</image:loc>
      <image:title>FreeScout Vulnerability Allows Unauthorized Chat Setting Changes</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41190/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/news/news-034.png</image:loc>
      <image:title>FreeScout Help Desk Vulnerability Exposes Hidden Conversation Drafts</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41189/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/vulnerability/vulnerability-051.png</image:loc>
      <image:title>FreeScout Vulnerability Lets Unauthorized Users Edit Support Threads</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-40591/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/news/news-016.png</image:loc>
      <image:title>FreeScout Vulnerability Allows Low-Privilege Agents to Expose Hidden Customer Data</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-40589/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/threats/threats-002.png</image:loc>
      <image:title>FreeScout Vulnerability Exposes Hidden Customer Data</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-40586/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/vulnerability/vulnerability-054.png</image:loc>
      <image:title>Unreal Engine Tool&apos;s Login Flaw Exposes Developers to Brute-Force Attacks</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-40585/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/tools/tools-023.png</image:loc>
      <image:title>Unreal Engine Dev Tool Vulnerability Allows Indefinite Password Reset Token Validity</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-40576/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/news/news-040.png</image:loc>
      <image:title>Excel-MCP-Server Path Traversal: Critical Flaw Exposes File System</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-40569/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/news/news-028.png</image:loc>
      <image:title>FreeScout Vulnerability Allows Silent Email Exfiltration and Hijacking</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-40568/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/tools/tools-031.png</image:loc>
      <image:title>FreeScout XSS Flaw Allows Session Hijacking and Data Exfiltration</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-40161/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/vulnerability/vulnerability-053.png</image:loc>
      <image:title>Tekton Pipelines Git Resolver Leaks API Tokens</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-40050/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/tools/tools-015.png</image:loc>
      <image:title>Critical Unauthenticated Path Traversal in CrowdStrike LogScale</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-24189/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/news/news-018.png</image:loc>
      <image:title>NVIDIA CUDA-Q Vulnerability Poses DoS, Info Disclosure Risk</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-24177/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/vulnerability/vulnerability-014.png</image:loc>
      <image:title>NVIDIA KAI Scheduler Flaw: Unauthorized API Access Poses Data Risk</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1427288221-8797/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/vulnerability/vulnerability-052.png</image:loc>
      <image:title>Israel&apos;s Cyber Power: A Look at Its Strengths and Challenges</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/uk-regulator-to-probe-telegram-teen-chat-sites-for-potentia-liksh/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/tools/tools-013.png</image:loc>
      <image:title>UK Regulator Eyes Telegram for Child Safety Violations</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-40565/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/tools/tools-049.png</image:loc>
      <image:title>CVE-2026-40565 — FreeScout is a free self-hosted help desk and shared</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/22-bridge-break-flaws-expose-20-000-lantronix-and-silex-seri-jqbgx/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/threats/threats-019.png</image:loc>
      <image:title>BRIDGE:BREAK Flaws Plague Lantronix and Silex Serial-to-IP Converters</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/surge-in-bomgar-rmm-exploitation-demonstrates-supply-chain-r-8u4il/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/tools/tools-012.png</image:loc>
      <image:title>Bomgar RMM Exploitation: A Supply Chain Wake-Up Call</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-1089/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/tools/tools-008.png</image:loc>
      <image:title>CVE-2026-1089 — Information Disclosure</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-0972/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/vulnerability/vulnerability-050.png</image:loc>
      <image:title>Fortra GoAnywhere MFT SFTP Brute Force Vulnerability</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-0971/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/news/news-008.png</image:loc>
      <image:title>CVE-2026-0971 — An improper session timeout issue in Fortra&apos;s GoAnywhere</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2025-31981/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/vulnerability/vulnerability-036.png</image:loc>
      <image:title>CVE-2025-31981 — HCL BigFix Service Management (SM) Discovery is vulnerable</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2025-14362/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/news/news-046.png</image:loc>
      <image:title>Fortra GoAnywhere MFT: SSH Key Brute Force Vulnerability Discovered</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2025-1241/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/news/news-002.png</image:loc>
      <image:title>CVE-2025-1241 — Encrypted values in Fortra&apos;s GoAnywhere MFT prior to</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1542954397-4527/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/vulnerability/vulnerability-004.png</image:loc>
      <image:title>Anthropic&apos;s STDIO Design Flaw: RCE in AI Ecosystem</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/google-fixes-critical-rce-flaw-in-ai-based-antigravity-tool-ppeak/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/news/news-028.png</image:loc>
      <image:title>Google Patches Critical RCE in AI Filesystem Tool</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/eu-targets-two-russian-propaganda-networks-with-new-sanction-qahn0/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/vulnerability/vulnerability-030.png</image:loc>
      <image:title>EU Sanctions Russian Propaganda Networks</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-40520/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/vulnerability/vulnerability-053.png</image:loc>
      <image:title>FreePBX Command Injection: Authenticated Attackers Gain Host Access</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/cloud-platform-vercel-says-company-breached-through-third-pa-oynwv/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/news/news-001.png</image:loc>
      <image:title>Third-Party AI Tool Exposes Vercel Customer Credentials</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/5-places-where-mature-socs-keep-mttr-fast-and-others-waste-t-mqe9i/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/vulnerability/vulnerability-013.png</image:loc>
      <image:title>MTTR Slowdown: It&apos;s Not Analysts, It&apos;s Bad Intel</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/unsecured-perforce-servers-expose-sensitive-data-from-major-z86gh/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/vulnerability/vulnerability-022.png</image:loc>
      <image:title>Unsecured Perforce Servers Leak Sensitive Data from Major Organizations</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/progress-patches-multiple-vulnerabilities-in-moveit-waf-loa-31f2b/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/tools/tools-020.png</image:loc>
      <image:title>Progress Patches Critical Flaws in MOVEit WAF, LoadMaster</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/no-exploit-needed-how-attackers-walk-through-the-front-door-b3n07/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/news/news-037.png</image:loc>
      <image:title>Identity Attacks Dominate: No Exploit Needed for Breach</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/organizations-warned-of-exploited-cisco-kentico-zimbra-vul-kkhdb/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/threats/threats-016.png</image:loc>
      <image:title>CISA Warns: Exploited Cisco, Kentico, Zimbra Flaws Demand Immediate Action</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/data-breaches-at-healthcare-organizations-in-illinois-and-te-hgyv5/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/vulnerability/vulnerability-052.png</image:loc>
      <image:title>Healthcare Breaches Hit 600,000 in Illinois and Texas</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/ngate-campaign-targets-brazil-trojanizes-handypay-to-steal-vl5ks/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/vulnerability/vulnerability-032.png</image:loc>
      <image:title>NGate Android Malware Targets Brazil, Abuses HandyPay App</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/google-patches-antigravity-ide-flaw-enabling-prompt-injectio-776uu/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/vulnerability/vulnerability-043.png</image:loc>
      <image:title>Google Antigravity IDE Flaw Led to Code Execution</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-39467/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/threats/threats-023.png</image:loc>
      <image:title>MetaSlider Vulnerability: Object Injection via Deserialization of Untrusted Data</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/former-ransomware-negotiator-pleads-guilty-to-blackcat-attac-pzvw9/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/tools/tools-054.png</image:loc>
      <image:title>Former Ransomware Negotiator Pleads Guilty to BlackCat Attacks</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/lockdown-lab/lockdown-az-001/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/lockdown/lockdown-cover.png</image:loc>
      <image:title>Enable MFA for all users</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1542954397-4526/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/news/news-054.png</image:loc>
      <image:title>Hermes Agent: Open-Source AI Assistant Gaining Traction</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1373735086-4990/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/threats/threats-003.png</image:loc>
      <image:title>Major Israeli Airline Passenger Data on Darknet</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6712/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/threats/threats-047.png</image:loc>
      <image:title>CVE-2026-6712 — Cross-Site Scripting (XSS)</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6711/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/vulnerability/vulnerability-024.png</image:loc>
      <image:title>CVE-2026-6711 — Cross-Site Scripting (XSS)</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6703/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/vulnerability/vulnerability-017.png</image:loc>
      <image:title>CVE-2026-6703 — The Responsive Blocks – Page Builder for Blocks &amp; Patterns</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-31370/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/threats/threats-022.png</image:loc>
      <image:title>CVE-2026-31370 — Honor E APP is affected by information leak vulnerability,</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-31368/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/news/news-045.png</image:loc>
      <image:title>CVE-2026-31368: AiAssistant Privilege Bypass Poses High Risk</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/cisa-adds-8-exploited-flaws-to-kev-sets-april-may-2026-fede-evtlh/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/threats/threats-008.png</image:loc>
      <image:title>CISA Adds 8 Exploited Vulnerabilities to KEV Catalog</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1707304340-2279/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/vulnerability/vulnerability-055.png</image:loc>
      <image:title>Seiko USA Hit by Suspected Shopify Breach and Extortion</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1707304340-2278/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/news/news-021.png</image:loc>
      <image:title>Alleged EL AL Passenger Data Sale: Low Price Raises Red Flags</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-5965/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/news/news-032.png</image:loc>
      <image:title>Critical Command Injection in NewSoftOA: Unauthenticated RCE Risk</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6675/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/vulnerability/vulnerability-004.png</image:loc>
      <image:title>CVE-2026-6675 — The Responsive Blocks – Page Builder for Blocks &amp; Patterns</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6674/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/tools/tools-001.png</image:loc>
      <image:title>CVE-2026-6674 — SQL Injection</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-40497/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/vulnerability/vulnerability-021.png</image:loc>
      <image:title>FreeScout CSS Injection Allows Privilege Escalation</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6058/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/tools/tools-030.png</image:loc>
      <image:title>CVE-2026-6058 — The CGI Program Of Zyxel WRE6505 Denial of Service</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-39973/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/threats/threats-037.png</image:loc>
      <image:title>Apktool Path Traversal: Arbitrary File Write Leads to RCE</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-39886/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/vulnerability/vulnerability-038.png</image:loc>
      <image:title>CVE-2026-39886 — Out-of-Bounds $1</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-39386/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/threats/threats-013.png</image:loc>
      <image:title>Neko Virtual Browser: Authenticated RCE to Admin Takeover</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-39378/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/threats/threats-002.png</image:loc>
      <image:title>CVE-2026-39378 — Path Traversal</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-39377/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/tools/tools-020.png</image:loc>
      <image:title>CVE-2026-39377 — Path Traversal</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-39320/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/news/news-008.png</image:loc>
      <image:title>Signal K Server DoS: Unauthenticated ReDoS Attack Hits Marine Systems</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41331/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/tools/tools-002.png</image:loc>
      <image:title>CVE-2026-41331 — Telegram Audio Preflight Transcription That Vulnerability</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41329/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/news/news-007.png</image:loc>
      <image:title>Critical OpenClaw Sandbox Bypass Allows Privilege Escalation</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41303/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/vulnerability/vulnerability-026.png</image:loc>
      <image:title>OpenClaw Discord Bot Vulnerability Allows Unauthorized Exec Approvals</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41302/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/news/news-035.png</image:loc>
      <image:title>OpenClaw SSRF Vulnerability Exposes Internal Resources</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41301/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/vulnerability/vulnerability-043.png</image:loc>
      <image:title>CVE-2026-41301 — The Nostr DM Ingress Path That Vulnerability</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41300/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/news/news-052.png</image:loc>
      <image:title>CVE-2026-41300 — OpenClaw before 2026.3.31 contains a trust-decline</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41299/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/tools/tools-041.png</image:loc>
      <image:title>OpenClaw Authorization Bypass Puts Operator Privileges at Risk</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41298/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/vulnerability/vulnerability-001.png</image:loc>
      <image:title>CVE-2026-41298 — OpenClaw before 2026.4.2 fails to enforce write scopes on</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41297/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/tools/tools-013.png</image:loc>
      <image:title>OpenClaw SSRF Vulnerability Exposes Internal Resources</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41296/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/threats/threats-050.png</image:loc>
      <image:title>OpenClaw Sandbox Escape Via Time-of-Check-Time-of-Use Race Condition</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41295/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/vulnerability/vulnerability-002.png</image:loc>
      <image:title>OpenClaw Vulnerability Allows Untrusted Code Execution Before Plugin Trust</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41294/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/tools/tools-045.png</image:loc>
      <image:title>OpenClaw .env Vulnerability: Local File Can Hijack Config</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-40045/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/threats/threats-044.png</image:loc>
      <image:title>CVE-2026-40045 — OpenClaw before 2026.4.2 accepts non-loopback cleartext</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-35588/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/vulnerability/vulnerability-025.png</image:loc>
      <image:title>CVE-2026-35588 — Glances is an open-source system cross-platform monitoring</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-35570/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/vulnerability/vulnerability-049.png</image:loc>
      <image:title>OpenClaude Path Traversal Bypasses Sandbox Controls</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-5721/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/tools/tools-004.png</image:loc>
      <image:title>CVE-2026-5721 — Cross-Site Scripting (XSS)</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/ukraine-busts-bot-farm-supplying-thousands-of-fake-telegra-r1ph9/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/tools/tools-002.png</image:loc>
      <image:title>Ukraine Busts Bot Farm Fueling Russian Disinformation</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6729/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/tools/tools-036.png</image:loc>
      <image:title>CVE-2026-6729 — HKUDS OpenHarness prior to PR #159 remediation contains a</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-4852/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/vulnerability/vulnerability-033.png</image:loc>
      <image:title>CVE-2026-4852 — Cross-Site Scripting (XSS)</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-33626/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/tools/tools-022.png</image:loc>
      <image:title>LMDeploy Vulnerability Exposes LLM Servers to SSRF Attacks</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-32613/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/threats/threats-038.png</image:loc>
      <image:title>Critical Spinnaker Vulnerability Exposes JVM to Attackers</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-32604/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/tools/tools-033.png</image:loc>
      <image:title>Critical Spinnaker Vulnerability Exposes Cloud Credentials</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/vercel-employee-s-ai-tool-access-led-to-data-breach-2qgvo/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/threats/threats-018.png</image:loc>
      <image:title>Vercel Breach: Stolen OAuth Tokens — New Lateral Movement Vector</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6550/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/tools/tools-037.png</image:loc>
      <image:title>CVE-2026-6550 — Cryptographic algorithm downgrade in the caching layer of</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6257/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/tools/tools-024.png</image:loc>
      <image:title>Vvveb CMS RCE: Authenticated Users Can Rename Files to Execute Code</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6249/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/tools/tools-042.png</image:loc>
      <image:title>Vvveb CMS RCE: Authenticated Users Can Own Your Server</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-5478/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/vulnerability/vulnerability-005.png</image:loc>
      <image:title>Everest Forms Plugin Vulnerability Allows Arbitrary File Read and Deletion</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/the-gentlemen-ransomware-now-uses-systembc-for-bot-powered-a-82zdg/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/tools/tools-010.png</image:loc>
      <image:title>Gentlemen Ransomware Leverages SystemBC Botnet for Attacks</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/daily-digest/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/news/news-041.png</image:loc>
      <image:title>Daily Security Digest — 2026-04-20</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6248/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/news/news-009.png</image:loc>
      <image:title>wpForo Plugin Flaw Allows Arbitrary File Deletion, RCE</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6060/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/tools/tools-025.png</image:loc>
      <image:title>CVE-2026-6060 — Denial of Service</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41389/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/news/news-042.png</image:loc>
      <image:title>CVE-2026-41389 — OpenClaw versions 2026.4.7 before 2026.4.15 fail to enforce</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-39112/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/threats/threats-004.png</image:loc>
      <image:title>CVE-2026-39112 — Cross Site Scripting vulnerability in Apartment Visitors</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-39111/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/news/news-043.png</image:loc>
      <image:title>Unauthenticated SQLi in Apartment Visitors Management System</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-23757/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/news/news-025.png</image:loc>
      <image:title>CVE-2026-23757 — Cross-Site Scripting (XSS)</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-23756/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/news/news-015.png</image:loc>
      <image:title>CVE-2026-23756 — Cross-Site Scripting (XSS)</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-23753/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/news/news-031.png</image:loc>
      <image:title>CVE-2026-23753 — Cross-Site Scripting (XSS)</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-23752/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/tools/tools-039.png</image:loc>
      <image:title>CVE-2026-23752 — The Template Group Creation And Editing Functionality That Cross-Site Scripting (XSS)</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6662/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/news/news-003.png</image:loc>
      <image:title>CVE-2026-6662: Open CORS Policy in copilot-api Exposes Token Endpoint</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41445/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/threats/threats-005.png</image:loc>
      <image:title>KissFFT Integer Overflow: Heap Corruption Risk in Signal Processing</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-35154/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/vulnerability/vulnerability-040.png</image:loc>
      <image:title>CVE-2026-35154 — IDRAC. A High Privileged Attacker With Local Access Vulnerability</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-28684/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/threats/threats-020.png</image:loc>
      <image:title>CVE-2026-28684 — Arbitrary File Access</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-26951/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/tools/tools-044.png</image:loc>
      <image:title>CVE-2026-26951 — Buffer Overflow</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-26943/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/vulnerability/vulnerability-052.png</image:loc>
      <image:title>Dell PowerProtect Data Domain OS Command Injection: Root Access Risk</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-26942/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/threats/threats-009.png</image:loc>
      <image:title>CVE-2026-26942 — Command Injection</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-25525/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/vulnerability/vulnerability-015.png</image:loc>
      <image:title>CVE-2026-25525 — Path Traversal</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-25524/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/threats/threats-051.png</image:loc>
      <image:title>OpenMage LTS Vulnerability Allows Arbitrary Code Execution via Phar Files</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-24506/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/tools/tools-054.png</image:loc>
      <image:title>Dell PowerProtect Data Domain: Root OS Command Injection</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-24505/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/vulnerability/vulnerability-028.png</image:loc>
      <image:title>Dell PowerProtect Data Domain: Remote Root Execution Vulnerability</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-24504/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/threats/threats-043.png</image:loc>
      <image:title>Dell PowerProtect Vulnerability Allows Root Command Execution</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-22761/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/vulnerability/vulnerability-047.png</image:loc>
      <image:title>CVE-2026-22761 — Command Injection</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2025-66954/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/threats/threats-028.png</image:loc>
      <image:title>CVE-2025-66954 — A vulnerability exists in the Buffalo Link Station version</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/sglang-cve-2026-5760-cvss-9-8-enables-rce-via-malicious-gg-sfdei/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/news/news-050.png</image:loc>
      <image:title>Critical RCE in SGLang via Malicious GGUF Models</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/italian-regulator-fines-national-postal-service-orgs-15-mil-ysqt8/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/tools/tools-026.png</image:loc>
      <image:title>Italian Postal Service Slapped with $15M Fine for Data Privacy Violations</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1427288221-8796/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/threats/threats-007.png</image:loc>
      <image:title>Lovable Exposes Sensitive User Data Due to Unpatched Vulnerability</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/crypto-infrastructure-company-blames-290-million-theft-on-n-59zur/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/vulnerability/vulnerability-010.png</image:loc>
      <image:title>North Korea Linked to $290 Million Crypto Heist</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6652/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/vulnerability/vulnerability-036.png</image:loc>
      <image:title>CVE-2026-6652 — The Function Evaluate Of The File App/Modules/View/Src/PhpEn Vulnerability</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6650/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/news/news-004.png</image:loc>
      <image:title>CVE-2026-6650 — Z-BlogPHP Unrestricted File Upload</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6066/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/threats/threats-040.png</image:loc>
      <image:title>ConnectWise Automate Flaw Exposes Client Traffic to Interception</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41245/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/tools/tools-051.png</image:loc>
      <image:title>CVE-2026-41245 — `LocalFolderExtractor` Path Traversal</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-40896/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/vulnerability/vulnerability-042.png</image:loc>
      <image:title>CVE-2026-40896 — OpenProject is open-source, web-based project management</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-39918/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/tools/tools-038.png</image:loc>
      <image:title>Unauthenticated RCE in Vvveb Installer: Critical Flaw Exposes Web Servers</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-34429/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/threats/threats-034.png</image:loc>
      <image:title>CVE-2026-34429 — Remote Code Execution</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-34428/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/threats/threats-046.png</image:loc>
      <image:title>Vvveb SSRF Exposes Internal Networks and Files</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-34427/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/tools/tools-005.png</image:loc>
      <image:title>Vvveb Privilege Escalation: RCE via Admin Profile Modification</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-26944/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/vulnerability/vulnerability-050.png</image:loc>
      <image:title>Critical Dell PowerProtect Vulnerability Allows Root Command Execution</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-25883/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/vulnerability/vulnerability-014.png</image:loc>
      <image:title>CVE-2026-25883 — Server-Side Request Forgery</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-25058/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/vulnerability/vulnerability-050.png</image:loc>
      <image:title>Vexa Meeting Bot Exposes Unauthenticated Transcripts</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-24468/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/tools/tools-011.png</image:loc>
      <image:title>CVE-2026-24468 — OpenAEV is an open source platform allowing organizations</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-24467/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/threats/threats-014.png</image:loc>
      <image:title>OpenAEV Account Takeover: Critical Flaws in Password Reset</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-23774/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/news/news-014.png</image:loc>
      <image:title>Dell PowerProtect Data Domain Vulnerable to OS Command Injection</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/elon-musk-fails-to-appear-for-questioning-by-french-police-o-tlg6w/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/vulnerability/vulnerability-002.png</image:loc>
      <image:title>Musk Skips French Police Interview on X&apos;s AI Image Scandal</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6649/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/tools/tools-039.png</image:loc>
      <image:title>CVE-2026-6649 — Server-Side Request Forgery</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-4048/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/tools/tools-018.png</image:loc>
      <image:title>Authenticated Command Injection in Progress ADC LoadMaster</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-3519/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/vulnerability/vulnerability-016.png</image:loc>
      <image:title>Progress ADC RCE: Authenticated API Flaw Exposes LoadMaster</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-3518/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/threats/threats-022.png</image:loc>
      <image:title>Critical RCE Flaw in Progress ADC LoadMaster Appliances</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-3517/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/vulnerability/vulnerability-015.png</image:loc>
      <image:title>Progress ADC Products Face Critical OS Command Injection RCE</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/cyberattack-at-french-identity-document-agency-may-have-expo-o2jg9/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/vulnerability/vulnerability-022.png</image:loc>
      <image:title>French Identity Agency Hit by Cyberattack, Personal Data Exposed</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/bluesky-blames-app-outage-on-sophisticated-ddos-attack-p46c6/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/tools/tools-016.png</image:loc>
      <image:title>Bluesky Hit by &apos;Sophisticated&apos; DDoS Attack</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/weekly-recap-vercel-hack-push-fraud-qemu-abused-new-an-m6nuz/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/news/news-014.png</image:loc>
      <image:title>Attackers Exploit Trust, Not Just Systems, Weekly Threat Recap Shows</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6636/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/threats/threats-047.png</image:loc>
      <image:title>CVE-2026-6636 — P2r3 Convert Path Traversal</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6635/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/tools/tools-042.png</image:loc>
      <image:title>Rowboat Labs Tool Exposed by Improper Authentication Vulnerability</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6634/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/news/news-047.png</image:loc>
      <image:title>CVE-2026-6634 — The Function Memos_access_token Of The File Src/App.Tsx Of T Vulnerability</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/indian-agency-arrests-key-sim-card-supplier-of-a-broader-cyb-eap13/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/threats/threats-033.png</image:loc>
      <image:title>India Cracks Down on SIM Card Fraudsters Fueling Cybercrime</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/incd-alert_1990/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1680992045563-2ab442f3feee?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Attackers Disrupt Strong Authentication to Steal Credentials</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/cisa-kev-CVE-2026-20133/</loc>
    <image:image>
      <image:loc>https://shimiscyberworld.com/assets/images/covers/vulnerability.svg</image:loc>
      <image:title>CVE-2026-20133 — Cisco Catalyst SD-WAN Manager: Cisco Catalyst SD-WAN Manager Exposure of Sensitive Information to an Unauthorized Actor Vulnerability</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/cisa-kev-CVE-2026-20128/</loc>
    <image:image>
      <image:loc>https://shimiscyberworld.com/assets/images/covers/vulnerability.svg</image:loc>
      <image:title>CVE-2026-20128 — Cisco Catalyst SD-WAN Manager: Cisco Catalyst SD-WAN Manager Storing Passwords in a Recoverable Format Vulnerability</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/cisa-kev-CVE-2026-20122/</loc>
    <image:image>
      <image:loc>https://shimiscyberworld.com/assets/images/covers/vulnerability.svg</image:loc>
      <image:title>CVE-2026-20122 — Cisco Catalyst SD-WAN Manger: Cisco Catalyst SD-WAN Manager Incorrect Use of Privileged APIs Vulnerability</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/cisa-kev-CVE-2025-48700/</loc>
    <image:image>
      <image:loc>https://shimiscyberworld.com/assets/images/covers/vulnerability.svg</image:loc>
      <image:title>CVE-2025-48700 — Synacor Zimbra Collaboration Suite (ZCS): Synacor Zimbra Collaboration Suite (ZCS) Cross-site Scripting Vulnerability</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/cisa-kev-CVE-2025-32975/</loc>
    <image:image>
      <image:loc>https://shimiscyberworld.com/assets/images/covers/vulnerability.svg</image:loc>
      <image:title>CVE-2025-32975 — Quest KACE Systems Management Appliance (SMA): Quest KACE Systems Management Appliance (SMA) Improper Authentication Vulnerability</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/cisa-kev-CVE-2025-2749/</loc>
    <image:image>
      <image:loc>https://shimiscyberworld.com/assets/images/covers/vulnerability.svg</image:loc>
      <image:title>CVE-2025-2749 — Kentico Kentico Xperience: Kentico Xperience Path Traversal Vulnerability</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/cisa-kev-CVE-2024-27199/</loc>
    <image:image>
      <image:loc>https://shimiscyberworld.com/assets/images/covers/vulnerability.svg</image:loc>
      <image:title>CVE-2024-27199 — JetBrains TeamCity: JetBrains TeamCity Relative Path Traversal Vulnerability</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/cisa-kev-CVE-2023-27351/</loc>
    <image:image>
      <image:loc>https://shimiscyberworld.com/assets/images/covers/vulnerability.svg</image:loc>
      <image:title>CVE-2023-27351 — PaperCut NG/MF: PaperCut NG/MF Improper Authentication Vulnerability</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/british-hacker-tied-to-scattered-spider-campaign-pleads-guil-h9ntf/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/vulnerability/vulnerability-039.png</image:loc>
      <image:title>Scattered Spider Affiliate Pleads Guilty to $8M Crypto Heist</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/why-most-ai-deployments-stall-after-the-demo-uv33k/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/news/news-048.png</image:loc>
      <image:title>AI Deployments Stall: Reality Bites After the Demo</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6632/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/tools/tools-027.png</image:loc>
      <image:title>Tenda Router Vulnerability Exposes Networks to Remote Exploitation</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6631/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/vulnerability/vulnerability-036.png</image:loc>
      <image:title>Tenda Router Vulnerability Exposes Networks to Remote Exploitation</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6630/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/threats/threats-036.png</image:loc>
      <image:title>Tenda Router Vulnerability: Remote Exploitable Buffer Overflow</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6629/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/threats/threats-005.png</image:loc>
      <image:title>SQL Injection Flaw in MetaCRM Exposes Systems to Remote Attack</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/anthropic-mcp-design-vulnerability-enables-rce-threatening-f33ip/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/vulnerability/vulnerability-025.png</image:loc>
      <image:title>MCP Design Flaw Opens Door to RCE, Threatening AI Supply Chain</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6628/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/threats/threats-039.png</image:loc>
      <image:title>CVE-2026-6628 — Phili67 Ecclesia CRM SQL Injection</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6626/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/vulnerability/vulnerability-054.png</image:loc>
      <image:title>CVE-2026-6626 — Cockpit-HQ Cockpit Vulnerability</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6625/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/vulnerability/vulnerability-004.png</image:loc>
      <image:title>Mogu Blog Vulnerability: SSRF Allows Remote Server Takeover</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6621/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/news/news-001.png</image:loc>
      <image:title>CVE-2026-6621: Prototype Pollution in 1024bit extend-deep</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6620/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/threats/threats-042.png</image:loc>
      <image:title>CVE-2026-6620 — SonicCloudOrg Sonic-Server Path Traversal</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6618/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/threats/threats-043.png</image:loc>
      <image:title>CVE-2026-6618 — Langgenius Dify Server-Side Request Forgery</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-5967/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/vulnerability/vulnerability-042.png</image:loc>
      <image:title>Critical Privilege Escalation in ThreatSonar Anti-Ransomware</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-39454/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/vulnerability/vulnerability-013.png</image:loc>
      <image:title>SKYSEA Client View: Local Privilege Escalation via Improper Permissions (CVE-2026-39454)</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/lockdown-lab/lockdown-az-001/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/lockdown/lockdown-cover.png</image:loc>
      <image:title>Enable MFA for all users</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/lockdown-lab/lockdown-aws-001/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/lockdown/lockdown-cover.png</image:loc>
      <image:title>Enable MFA on root account</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1427288221-8794/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/news/news-018.png</image:loc>
      <image:title>Fraud Campaign Impersonates Major Israeli Brands</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/microsoft-releases-emergency-updates-to-fix-windows-server-i-e9svb/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/news/news-017.png</image:loc>
      <image:title>Microsoft&apos;s Emergency Patch: Fixing Broken Windows Server Updates</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/next-js-creator-vercel-hacked-167qa/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/news/news-029.png</image:loc>
      <image:title>Vercel Confirms Breach, Data Offered for $2 Million</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6617/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/tools/tools-012.png</image:loc>
      <image:title>CVE-2026-6617 — Langgenius Dify Server-Side Request Forgery</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6616/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/tools/tools-035.png</image:loc>
      <image:title>CVE-2026-6616 — TransformerOptimus SuperAGI Server-Side Request Forgery</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6615/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/threats/threats-034.png</image:loc>
      <image:title>Path Traversal in SuperAGI Exploitable Remotely</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-5966/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/vulnerability/vulnerability-009.png</image:loc>
      <image:title>TeamT5 Anti-Ransomware Flaw: Path Traversal Exposes File Deletion Risk</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-5964/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/threats/threats-032.png</image:loc>
      <image:title>Critical SQL Injection in Digiwin EasyFlow .NET: Read, Modify, Delete Database Contents</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-5963/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/vulnerability/vulnerability-044.png</image:loc>
      <image:title>Critical SQL Injection in EasyFlow .NET: Unauthenticated Database Access</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41282/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/tools/tools-029.png</image:loc>
      <image:title>CVE-2026-41282 — ProjectDiscovery Nuclei 3 before 3.8.0 allows DSL</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/lockdown-lab/lockdown-win-001/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/lockdown/lockdown-cover.png</image:loc>
      <image:title>Rename and disable built-in Administrator</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6614/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/news/news-002.png</image:loc>
      <image:title>CVE-2026-6614 — TransformerOptimus SuperAGI Vulnerability</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6613/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/vulnerability/vulnerability-027.png</image:loc>
      <image:title>CVE-2026-6613 — TransformerOptimus SuperAGI Vulnerability</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6612/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/tools/tools-033.png</image:loc>
      <image:title>CVE-2026-6612 — A vulnerability was determined in TransformerOptimus</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/a-week-in-security-april-13-8211-april-19-gqvhg/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/news/news-009.png</image:loc>
      <image:title>Old Scams, New Tricks: From Fake Shipments to Zero-Days</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1427288221-8793/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/tools/tools-050.png</image:loc>
      <image:title>North Korea&apos;s KalepDao Heist: A Masterclass in Multi-Vector Attack</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6609/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/tools/tools-013.png</image:loc>
      <image:title>CVE-2026-6609 — Liangliangyy DjangoBlog Vulnerability</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6608/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/threats/threats-052.png</image:loc>
      <image:title>CVE-2026-6608 — Lm-Sys Fastchat Vulnerability</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1427288221-8791/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/tools/tools-028.png</image:loc>
      <image:title>Israeli Domain Registrar Galcomm Data Allegedly Leaked</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6607/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/threats/threats-023.png</image:loc>
      <image:title>CVE-2026-6607 — Lm-Sys Fastchat Vulnerability</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6606/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/threats/threats-008.png</image:loc>
      <image:title>CVE-2026-6606: SSRF in ModelScope AgentScope Audio Processing</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6605/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/threats/threats-053.png</image:loc>
      <image:title>ModelScope AgentScope Hit by Critical SSRF Vulnerability</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6604/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/news/news-010.png</image:loc>
      <image:title>Server-Side Request Forgery in ModelScope Agentscope</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6603/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/tools/tools-052.png</image:loc>
      <image:title>CVE-2026-6603: Remote Code Injection in ModelScope AgentScope</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6602/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/news/news-021.png</image:loc>
      <image:title>Hospital Management System Hit by Remote Unrestricted File Upload</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6601/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/threats/threats-002.png</image:loc>
      <image:title>CVE-2026-6601 — Lagom WHMCS Template Vulnerability</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6599/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/threats/threats-006.png</image:loc>
      <image:title>CVE-2026-6599 — Langflow-Ai Langflow Vulnerability</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6598/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/threats/threats-007.png</image:loc>
      <image:title>CVE-2026-6598 — Langflow-Ai Langflow Vulnerability</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-32965/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/vulnerability/vulnerability-022.png</image:loc>
      <image:title>Silex Tech Devices Vulnerable to Insecure Default Passwords</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-32964/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/news/news-007.png</image:loc>
      <image:title>CVE-2026-32964 — SD-330AC and AMC Manager provided by silex technology, Inc.</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-32963/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/tools/tools-041.png</image:loc>
      <image:title>CVE-2026-32963 — Cross-Site Scripting (XSS)</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-32962/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/tools/tools-053.png</image:loc>
      <image:title>CVE-2026-32962 — SD-330AC and AMC Manager provided by silex technology, Inc.</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-32961/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/vulnerability/vulnerability-006.png</image:loc>
      <image:title>CVE-2026-32961 — Buffer Overflow</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-32960/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/tools/tools-051.png</image:loc>
      <image:title>CVE-2026-32960 — SD-330AC and AMC Manager provided by silex technology, Inc.</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-32959/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/vulnerability/vulnerability-019.png</image:loc>
      <image:title>CVE-2026-32959 — SD-330AC and AMC Manager provided by silex technology, Inc.</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-32958/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/news/news-048.png</image:loc>
      <image:title>CVE-2026-32958 — SD-330AC and AMC Manager provided by silex technology, Inc.</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-32957/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/news/news-050.png</image:loc>
      <image:title>CVE-2026-32957 — Arbitrary File Access</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-32956/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/threats/threats-012.png</image:loc>
      <image:title>CRITICAL: Silex Technology Devices Vulnerable to Remote Code Execution</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-32955/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/tools/tools-015.png</image:loc>
      <image:title>High-Severity Buffer Overflow Hits Silex SD-330AC and AMC Manager</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/vercel-breach-tied-to-context-ai-hack-exposes-limited-custom-ml7vr/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/tools/tools-010.png</image:loc>
      <image:title>Vercel Breach: Context.ai Compromise Exposes Customer Credentials</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6596/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/vulnerability/vulnerability-055.png</image:loc>
      <image:title>High-Severity Unrestricted File Upload in Langflow AI</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6595/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/vulnerability/vulnerability-043.png</image:loc>
      <image:title>Unpatched SQLi in School Management System Puts Student Data at Risk</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6594/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/threats/threats-031.png</image:loc>
      <image:title>CVE-2026-6594: brikcss merge Prototype Pollution Vulnerability</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6591/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/tools/tools-011.png</image:loc>
      <image:title>CVE-2026-6591 — ComfyUI Path Traversal</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6590/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/threats/threats-003.png</image:loc>
      <image:title>CVE-2026-6590 — ComfyUI Path Traversal</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6589/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/threats/threats-033.png</image:loc>
      <image:title>CVE-2026-6589 — ComfyUI Vulnerability</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6588/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/tools/tools-006.png</image:loc>
      <image:title>CVE-2026-6588 — A weakness has been identified in serge-chat serge up to</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6587/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/news/news-027.png</image:loc>
      <image:title>CVE-2026-6587 — Vibrantlabsai RAGAS Server-Side Request Forgery</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6586/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/threats/threats-045.png</image:loc>
      <image:title>CVE-2026-6586 — TransformerOptimus SuperAGI Vulnerability</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6585/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/news/news-052.png</image:loc>
      <image:title>CVE-2026-6585 — The Function Update_organisation Of The File Superagi/Contro Vulnerability</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6584/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/tools/tools-004.png</image:loc>
      <image:title>CVE-2026-6584 — TransformerOptimus SuperAGI Vulnerability</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6583/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/threats/threats-011.png</image:loc>
      <image:title>CVE-2026-6583 — TransformerOptimus SuperAGI Vulnerability</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6582/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/threats/threats-001.png</image:loc>
      <image:title>Unauthenticated Access in TransformerOptimus SuperAGI Vector DB</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6581/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/threats/threats-029.png</image:loc>
      <image:title>H3C Magic B1 Routers Exposed: Critical Buffer Overflow Publicly Exploitable</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6580/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/news/news-004.png</image:loc>
      <image:title>CVE-2026-6580: Hard-Coded Crypto Key in DjangoBlog</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6579/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/news/news-025.png</image:loc>
      <image:title>CVE-2026-6579 — A weakness has been identified in liangliangyy DjangoBlog</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6578/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/tools/tools-019.png</image:loc>
      <image:title>CVE-2026-6578 — Liangliangyy DjangoBlog Vulnerability</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6577/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/tools/tools-020.png</image:loc>
      <image:title>DjangoBlog Faces High-Severity Authentication Bypass</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/daily-digest/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/tools/tools-008.png</image:loc>
      <image:title>Daily Security Digest — 2026-04-19</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1707304340-2276/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/news/news-022.png</image:loc>
      <image:title>Bluetooth Tracker in Greeting Card Exposes Dutch Warship Location</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6576/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/threats/threats-037.png</image:loc>
      <image:title>CVE-2026-6576 — Command Injection</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/lockdown-lab/lockdown-cps-002/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/lockdown/lockdown-cover.png</image:loc>
      <image:title>Restrict who can create and publish Copilot Studio agents</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/vercel-confirms-breach-as-hackers-claim-to-be-selling-stolen-sea7q/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/news/news-032.png</image:loc>
      <image:title>Vercel Confirms Breach, Stolen Data for Sale</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1427288221-8787/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/tools/tools-022.png</image:loc>
      <image:title>Vercel Breach: ShinyHunters Claims Internal System Access, Data Theft</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1427288221-8786/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/vulnerability/vulnerability-016.png</image:loc>
      <image:title>Shufersal Phishing Scam Targets Israeli Consumers</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6574/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/news/news-015.png</image:loc>
      <image:title>CVE-2026-6574: Hardcoded Credentials in osuuu LightPicture API</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6573/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/vulnerability/vulnerability-046.png</image:loc>
      <image:title>CVE-2026-6573 — PHPEMS Server-Side Request Forgery</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6572/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/vulnerability/vulnerability-028.png</image:loc>
      <image:title>CVE-2026-6572 — Collabora KodExplorer Vulnerability</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6571/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/news/news-016.png</image:loc>
      <image:title>CVE-2026-6571 — A weakness has been identified in kodcloud KodExplorer up</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6569/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/vulnerability/vulnerability-021.png</image:loc>
      <image:title>KodExplorer Vulnerability Exposes File Access to Unauthenticated Attackers</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6568/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/tools/tools-002.png</image:loc>
      <image:title>KodExplorer Path Traversal: Remote Exploitation Possible</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6564/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/vulnerability/vulnerability-041.png</image:loc>
      <image:title>CVE-2026-6564 — EMQ EMQX Enterprise Vulnerability</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1373735086-4987/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/news/news-028.png</image:loc>
      <image:title>Ransomware Activity Surges: CoinBase Cartel Dominates Latest Attacks</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6563/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/vulnerability/vulnerability-024.png</image:loc>
      <image:title>H3C Magic B1 Hit by Remotely Exploitable Buffer Overflow</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6562/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/tools/tools-055.png</image:loc>
      <image:title>Unpatched SQLi in dameng100 muucmf 1.9.5.20260309: Remote Exploit Available</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6561/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/vulnerability/vulnerability-047.png</image:loc>
      <image:title>CVE-2026-6561 — EyouCMS Unrestricted File Upload</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6560/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/vulnerability/vulnerability-030.png</image:loc>
      <image:title>H3C Magic B0 Routers Vulnerable to Remote Buffer Overflow</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1427288221-8785/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/vulnerability/vulnerability-051.png</image:loc>
      <image:title>MKBHD&apos;s Locked iPhone Hacked: $10,000 Fraud Exposes Physical Security Flaw</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6559/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/threats/threats-028.png</image:loc>
      <image:title>CVE-2026-6559 — The Function Sub_401F80 Of The File /Cgi-Bin/Login.Cgi Vulnerability</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1427288221-8783/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/vulnerability/vulnerability-015.png</image:loc>
      <image:title>KelpDAO Suffers $280M Crypto Heist</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-0868/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/threats/threats-025.png</image:loc>
      <image:title>CVE-2026-0868 — Cross-Site Scripting (XSS)</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1707304340-2275/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/news/news-040.png</image:loc>
      <image:title>Critical RCE in protobuf.js Demands Immediate Patching</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1707304340-2274/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/news/news-046.png</image:loc>
      <image:title>Unmanaged Identities Fuel Cloud Breaches; DDoS Services Dismantled</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-2986/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/vulnerability/vulnerability-006.png</image:loc>
      <image:title>CVE-2026-2986 — Cross-Site Scripting (XSS)</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-2505/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/vulnerability/vulnerability-005.png</image:loc>
      <image:title>CVE-2026-2505 — Cross-Site Scripting (XSS)</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-0894/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/vulnerability/vulnerability-001.png</image:loc>
      <image:title>CVE-2026-0894 — Cross-Site Scripting (XSS)</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/13-74m-hack-shuts-down-sanctioned-grinex-exchange-after-int-1axv6/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/news/news-019.png</image:loc>
      <image:title>Sanctioned Grinex Exchange Shuts Down After $13.74M Hack</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41254/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/vulnerability/vulnerability-033.png</image:loc>
      <image:title>CVE-2026-41254 — Integer Overflow</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41253/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/vulnerability/vulnerability-032.png</image:loc>
      <image:title>CVE-2026-41253 — Code Execution</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/mirai-variant-nexcorium-exploits-cve-2024-3721-to-hijack-tbk-cv4a2/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/news/news-020.png</image:loc>
      <image:title>Mirai Botnet Variants Target TBK DVRs via CVE-2024-3721</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6518/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/vulnerability/vulnerability-036.png</image:loc>
      <image:title>WordPress Plugin RCE: CMP Coming Soon &amp; Maintenance Vulnerability</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6048/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/vulnerability/vulnerability-035.png</image:loc>
      <image:title>CVE-2026-6048 — Cross-Site Scripting (XSS)</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-4801/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/vulnerability/vulnerability-034.png</image:loc>
      <image:title>CVE-2026-4801 — Cross-Site Scripting (XSS)</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-40494/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/vulnerability/vulnerability-029.png</image:loc>
      <image:title>Critical Heap Overflow in SAIL TGA Codec (CVE-2026-40494)</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-40493/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/vulnerability/vulnerability-028.png</image:loc>
      <image:title>Critical Heap Overflow in SAIL Image Library (CVE-2026-40493)</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-40492/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/vulnerability/vulnerability-027.png</image:loc>
      <image:title>Critical SAIL Library Bug: Memory Corruption Threat in Image Processing</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-40491/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/vulnerability/vulnerability-026.png</image:loc>
      <image:title>CVE-2026-40491 — Remote Code Execution</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-40490/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/vulnerability/vulnerability-025.png</image:loc>
      <image:title>CVE-2026-40490 — Open Redirect</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-40487/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/vulnerability/vulnerability-024.png</image:loc>
      <image:title>Postiz AI Tool Vulnerability Allows Account Takeover via XSS</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-35582/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/vulnerability/vulnerability-008.png</image:loc>
      <image:title>Emissary Workflow Engine Vulnerable to OS Command Injection</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-1838/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/vulnerability/vulnerability-003.png</image:loc>
      <image:title>CVE-2026-1838 — Cross-Site Scripting (XSS)</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-1559/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/vulnerability/vulnerability-002.png</image:loc>
      <image:title>CVE-2026-1559 — Cross-Site Scripting (XSS)</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-40572/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/vulnerability/vulnerability-030.png</image:loc>
      <image:title>Critical NovumOS Flaw: Kernel Takeover via Memory Mapping</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-40350/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/vulnerability/vulnerability-020.png</image:loc>
      <image:title>Movary Flaw Allows Admin Account Creation, High-Severity Risk</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-40317/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/vulnerability/vulnerability-009.png</image:loc>
      <image:title>Critical Flaw in NovumOS Allows Kernel Privilege Escalation</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-35465/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/vulnerability/vulnerability-007.png</image:loc>
      <image:title>SecureDrop Client RCE: Server Compromise Leads to VM Takeover</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-40581/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/vulnerability/vulnerability-031.png</image:loc>
      <image:title>ChurchCRM Flaw: Data Deletion Via CSRF</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-40485/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/vulnerability/vulnerability-023.png</image:loc>
      <image:title>CVE-2026-40485 — ChurchCRM is an open-source church management system. In</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-40484/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/vulnerability/vulnerability-022.png</image:loc>
      <image:title>ChurchCRM RCE: Unauthenticated Admin Exploit via Backup Restore</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-40483/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/vulnerability/vulnerability-021.png</image:loc>
      <image:title>CVE-2026-40483 — Cross-Site Scripting (XSS)</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-40349/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/vulnerability/vulnerability-019.png</image:loc>
      <image:title>Movary Admin Escalation: A Simple Patch, A Critical Flaw</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-40348/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/vulnerability/vulnerability-018.png</image:loc>
      <image:title>Movary SSRF: Authenticated Users Can Probe Internal Networks</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-40347/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/vulnerability/vulnerability-017.png</image:loc>
      <image:title>CVE-2026-40347 — Denial of Service</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-40340/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/vulnerability/vulnerability-016.png</image:loc>
      <image:title>CVE-2026-40340 — Out-of-Bounds $1</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-40339/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/vulnerability/vulnerability-015.png</image:loc>
      <image:title>CVE-2026-40339 — Out-of-Bounds $1</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-40338/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/vulnerability/vulnerability-014.png</image:loc>
      <image:title>CVE-2026-40338 — Out-of-Bounds $1</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-40337/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/vulnerability/vulnerability-013.png</image:loc>
      <image:title>CVE-2026-40337 — Denial of Service</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-40335/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/vulnerability/vulnerability-012.png</image:loc>
      <image:title>CVE-2026-40335 — Out-of-Bounds $1</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-40333/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/vulnerability/vulnerability-011.png</image:loc>
      <image:title>CVE-2026-40333 — libgphoto2 is a camera access and control library. In</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-40324/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/vulnerability/vulnerability-010.png</image:loc>
      <image:title>Critical Hot Chocolate GraphQL Server DoS Vulnerability</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-2262/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/vulnerability/vulnerability-004.png</image:loc>
      <image:title>WordPress Plugin Exposes Sensitive Customer Data</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-40486/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/vulnerability/vulnerability-015.png</image:loc>
      <image:title>CVE-2026-40486 — Kimai is an open-source time tracking application. In</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-40479/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/vulnerability/vulnerability-014.png</image:loc>
      <image:title>CVE-2026-40479 — Cross-Site Scripting (XSS)</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-2434/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/vulnerability/vulnerability-016.png</image:loc>
      <image:title>CVE-2026-2434 — Cross-Site Scripting (XSS)</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/threat-brief-escalation-of-cyber-risk-related-to-iran-upda-az55c/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/news/news-016.png</image:loc>
      <image:title>Iranian Cyber Risk Escalates: Phishing, Hacktivism, and Cybercrime Surging</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-40478/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/vulnerability/vulnerability-013.png</image:loc>
      <image:title>Critical Thymeleaf Vulnerability Bypasses Injection Protections</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-40477/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/vulnerability/vulnerability-012.png</image:loc>
      <image:title>Critical Thymeleaf Vulnerability Bypasses Injection Protections</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-40474/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/vulnerability/vulnerability-011.png</image:loc>
      <image:title>wger Fitness Manager: Auth Bypass Grants Global Config Control</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-40352/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/vulnerability/vulnerability-008.png</image:loc>
      <image:title>FastGPT NoSQL Injection: Account Takeover Risk</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-40351/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/vulnerability/vulnerability-007.png</image:loc>
      <image:title>Critical NoSQL Injection in FastGPT Allows Root Admin Takeover</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-40321/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/vulnerability/vulnerability-005.png</image:loc>
      <image:title>High-Severity XSS in DNN CMS Demands Immediate Patching</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-40305/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/vulnerability/vulnerability-004.png</image:loc>
      <image:title>CVE-2026-40305 — DNN (formerly DotNetNuke) is an open-source web content</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-40304/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/vulnerability/vulnerability-003.png</image:loc>
      <image:title>CVE-2026-40304 — zrok is software for sharing web services, files, and</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-40258/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/vulnerability/vulnerability-047.png</image:loc>
      <image:title>Critical Path Traversal in Gramps Web API Puts Data at Risk</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-40527/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/vulnerability/vulnerability-020.png</image:loc>
      <image:title>Radare2 Command Injection Flaw Exposes Analysis Workflow</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-40303/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/vulnerability/vulnerability-002.png</image:loc>
      <image:title>zrok Heap Overflow: Unauthenticated DoS Risk</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-40302/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/vulnerability/vulnerability-001.png</image:loc>
      <image:title>CVE-2026-40302 — zrok is software for sharing web services, files, and</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-40301/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/vulnerability/vulnerability-055.png</image:loc>
      <image:title>CVE-2026-40301 — DOMSanitizer is a DOM/SVG/MathML Sanitizer for PHP 7.3+.</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-40293/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/vulnerability/vulnerability-054.png</image:loc>
      <image:title>CVE-2026-40293 — OpenFGA is an authorization/permission engine built for</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-40286/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/vulnerability/vulnerability-053.png</image:loc>
      <image:title>WeGIA Web Manager: Stored XSS Puts Charitable Institutions at Risk</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-40285/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/vulnerability/vulnerability-052.png</image:loc>
      <image:title>WeGIA SQLi: Authenticated Users Can Impersonate Others</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-40284/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/vulnerability/vulnerability-051.png</image:loc>
      <image:title>CVE-2026-40284 — Other Users Cross-Site Scripting (XSS)</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-40196/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/vulnerability/vulnerability-046.png</image:loc>
      <image:title>HomeBox API Flaw Bypasses Access Controls</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-40155/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/vulnerability/vulnerability-045.png</image:loc>
      <image:title>CVE-2026-40155 — The Auth0 Next.js SDK is a library for implementing user</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-33145/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/vulnerability/vulnerability-026.png</image:loc>
      <image:title>CVE-2026-33145 — xrdp is an open source RDP server. Versions through 0.10.5</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-40461/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/vulnerability/vulnerability-010.png</image:loc>
      <image:title>Anviz CX2/CX7 Vulnerability: Unauthenticated Debug Access</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-40434/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/vulnerability/vulnerability-009.png</image:loc>
      <image:title>Anviz CrossChex Vulnerability Allows Network Packet Injection</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-40342/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/vulnerability/vulnerability-006.png</image:loc>
      <image:title>Firebird Database Vulnerability Allows RCE via Path Traversal</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-40283/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/vulnerability/vulnerability-050.png</image:loc>
      <image:title>CVE-2026-40283 — Cross-Site Scripting (XSS)</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-40066/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/vulnerability/vulnerability-044.png</image:loc>
      <image:title>Anviz Devices Leak Remote Code Execution via Unverified Updates</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-35682/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/vulnerability/vulnerability-041.png</image:loc>
      <image:title>Anviz CX2 Lite Vulnerable to Root-Level Command Injection</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-35546/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/vulnerability/vulnerability-040.png</image:loc>
      <image:title>Anviz Devices Exposed: Critical Firmware Upload Vulnerability Allows Remote Code Execution</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-35215/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/vulnerability/vulnerability-039.png</image:loc>
      <image:title>Firebird DB Division by Zero Vulnerability Crashes Servers</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-34232/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/vulnerability/vulnerability-032.png</image:loc>
      <image:title>Firebird Vulnerability: Unauthenticated Crash via Crafted Packet</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-33569/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/vulnerability/vulnerability-030.png</image:loc>
      <image:title>CVE-2026-33569 — Anviz CX2 Lite and CX7 administrative sessions occur over</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-33093/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/vulnerability/vulnerability-025.png</image:loc>
      <image:title>CVE-2026-33093 — Anviz CX7 Firmware is vulnerable to an unauthenticated POST</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-32650/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/vulnerability/vulnerability-024.png</image:loc>
      <image:title>Anviz CrossChex Standard: Plaintext Credentials Exposed via TDS7 Flaw</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-32648/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/vulnerability/vulnerability-023.png</image:loc>
      <image:title>CVE-2026-32648 — Anviz CX2 Lite and CX7 are vulnerable to unauthenticated</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-32324/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/vulnerability/vulnerability-022.png</image:loc>
      <image:title>Anviz CX7 Firmware Flaw Exposes Sensitive Device Communications</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-32107/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/vulnerability/vulnerability-021.png</image:loc>
      <image:title>xrdp Vulnerability Allows Local Privilege Escalation to Root</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6437/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/vulnerability/vulnerability-040.png</image:loc>
      <image:title>CVE-2026-6437 — Improper neutralization of argument delimiters in the</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-40525/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/vulnerability/vulnerability-019.png</image:loc>
      <image:title>Critical OpenViking Auth Bypass: Unset API Key Grants Full Bot Control</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-33337/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/vulnerability/vulnerability-028.png</image:loc>
      <image:title>Firebird Database Vulnerability Exposes Systems to Remote Crashes</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-28224/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/vulnerability/vulnerability-019.png</image:loc>
      <image:title>Unauthenticated Firebird Crash: Null Pointer Dereference Exposes Databases</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-28212/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/vulnerability/vulnerability-018.png</image:loc>
      <image:title>Firebird Null Pointer Dereference: Unauthenticated Remote Crash Risk</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-27890/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/vulnerability/vulnerability-017.png</image:loc>
      <image:title>Firebird Vulnerability CVE-2026-27890: Unauthenticated Crash Risk</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/payouts-king-ransomware-uses-qemu-vms-to-bypass-endpoint-sec-t264g/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/news/news-010.png</image:loc>
      <image:title>Payouts King Ransomware Hides in QEMU VMs to Evade Detection</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/ransomware-attack-continues-to-disrupt-healthcare-in-london-37byy/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/news/news-011.png</image:loc>
      <image:title>NHS Ransomware Fallout Lingers 18 Months On</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/four-arrested-in-latest-poweroff-ddos-for-hire-takedown-sw70y/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/news/news-003.png</image:loc>
      <image:title>Global DDoS-for-Hire Takedown Nabs Four, Disrupts &apos;PowerOFF&apos; Operations</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-5718/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/vulnerability/vulnerability-034.png</image:loc>
      <image:title>WordPress Plugin RCE: Drag and Drop File Upload Flaw</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-5710/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/vulnerability/vulnerability-033.png</image:loc>
      <image:title>Path Traversal in WordPress Plugin Exposes Files</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2025-65104/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/vulnerability/vulnerability-007.png</image:loc>
      <image:title>Firebird Client Flaw Leaks Data with Newer Servers</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-40518/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/vulnerability/vulnerability-018.png</image:loc>
      <image:title>ByteDance DeerFlow Path Traversal Allows Arbitrary File Writes</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-40516/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/vulnerability/vulnerability-017.png</image:loc>
      <image:title>OpenHarness SSRF Exposes Private Services, Cloud Metadata</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-40515/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/vulnerability/vulnerability-016.png</image:loc>
      <image:title>OpenHarness Flaw Exposes Sensitive Files via Path Normalization Bypass</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-3464/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/vulnerability/vulnerability-033.png</image:loc>
      <image:title>WP Customer Area Plugin: Arbitrary File Read/Delete Exposes WordPress</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6497/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/vulnerability/vulnerability-054.png</image:loc>
      <image:title>CVE-2026-6497 — Server-Side Request Forgery</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6284/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/vulnerability/vulnerability-038.png</image:loc>
      <image:title>Critical PLC Flaw Allows Network-Based Password Brute-Force</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6496/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/vulnerability/vulnerability-053.png</image:loc>
      <image:title>CVE-2026-6496 — Prasathmani TinyFileManager Path Traversal</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41153/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/vulnerability/vulnerability-021.png</image:loc>
      <image:title>CVE-2026-41153 — In JetBrains Junie before 252.549.29 command execution was</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6492/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/vulnerability/vulnerability-051.png</image:loc>
      <image:title>CVE-2026-6492 — Arnobt78 Hotel Booking Management System Information Disclosure</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6491/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/vulnerability/vulnerability-050.png</image:loc>
      <image:title>CVE-2026-6491 — Libvips Buffer Overflow</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6490/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/vulnerability/vulnerability-049.png</image:loc>
      <image:title>SQL Injection Flaw in QueryMine SMS: Remote Exploitation Possible</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/ukraine-confirms-suspected-apt28-campaign-targeting-prosecut-3l2et/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/news/news-018.png</image:loc>
      <image:title>APT28 Exploits Roundcube for Ukraine Cyber Espionage</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6507/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/vulnerability/vulnerability-055.png</image:loc>
      <image:title>Dnsmasq Vulnerability Allows Remote DoS via Crafted BOOTREPLY</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6489/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/vulnerability/vulnerability-048.png</image:loc>
      <image:title>CVE-2026-6489 — QueryMine Sms Unrestricted File Upload</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6488/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/vulnerability/vulnerability-047.png</image:loc>
      <image:title>CVE-2026-6488 — QueryMine Sms SQL Injection</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6487/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/vulnerability/vulnerability-046.png</image:loc>
      <image:title>CVE-2026-6487 — Qihui Jtbc5 CMS Path Traversal</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/in-defeat-for-trump-house-extends-electronic-spying-program-93zww/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/news/news-005.png</image:loc>
      <image:title>House Extends FISA Surveillance Powers Amidst Political Stalemate</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-28263/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/vulnerability/vulnerability-020.png</image:loc>
      <image:title>CVE-2026-28263 — Cross-Site Scripting (XSS)</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-23777/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/vulnerability/vulnerability-012.png</image:loc>
      <image:title>CVE-2026-23777 — Dell PowerProtect Data Domain with Data Domain Operating</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2025-46641/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/vulnerability/vulnerability-006.png</image:loc>
      <image:title>CVE-2025-46641 — Dell PowerProtect Data Domain with Data Domain Operating</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2025-46607/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/vulnerability/vulnerability-005.png</image:loc>
      <image:title>CVE-2025-46607 — Dell PowerProtect Data Domain with Data Domain Operating</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2025-46606/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/vulnerability/vulnerability-004.png</image:loc>
      <image:title>CVE-2025-46606 — Dell PowerProtect Data Domain with Data Domain Operating</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2025-46605/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/vulnerability/vulnerability-003.png</image:loc>
      <image:title>CVE-2025-46605 — Dell PowerProtect Data Domain with Data Domain Operating</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/incd-alert_1988/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/vulnerability/vulnerability-001.png</image:loc>
      <image:title>Microsoft April 2024 Security Updates: Zero-Day Exploited, Critical Vulnerabilities Addressed</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/in-other-news-satellite-cybersecurity-act-90k-chrome-flaw-u6m0k/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/news/news-006.png</image:loc>
      <image:title>ShowDoc Exploit and Growing Satellite Security Concerns Emerge</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6483/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/vulnerability/vulnerability-045.png</image:loc>
      <image:title>Wavlink Router OS Command Injection: Public Exploit Available</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-35153/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/vulnerability/vulnerability-038.png</image:loc>
      <image:title>CVE-2026-35153 — Dell PowerProtect Data Domain, versions 7.7.1.0 through</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-35074/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/vulnerability/vulnerability-037.png</image:loc>
      <image:title>CVE-2026-35074 — Command Injection</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-35073/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/vulnerability/vulnerability-036.png</image:loc>
      <image:title>CVE-2026-35073 — Command Injection</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-35072/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/vulnerability/vulnerability-035.png</image:loc>
      <image:title>CVE-2026-35072 — Command Injection</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1427288221-8781/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/news/news-014.png</image:loc>
      <image:title>ZionSiphon Malware Targets Israeli Water Systems</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1427288221-8780/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/news/news-013.png</image:loc>
      <image:title>PowerOFF Targets DDoS Operators: 53 Domains Seized, Arrests Made</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/google-blocks-8-3b-policy-violating-ads-in-2025-launches-an-boa3u/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/news/news-004.png</image:loc>
      <image:title>Google Cracks Down on Malicious Ads, Tightens Android Privacy</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-23779/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/vulnerability/vulnerability-014.png</image:loc>
      <image:title>CVE-2026-23779 — Command Injection</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-23776/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/vulnerability/vulnerability-011.png</image:loc>
      <image:title>Dell DD OS Vulnerability: Certificate Login Elevation of Privilege</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/cisa-flags-apache-activemq-flaw-as-actively-exploited-in-att-oljo3/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/news/news-002.png</image:loc>
      <image:title>CISA Warns: Active Exploitation of 13-Year-Old Apache ActiveMQ Flaw</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/two-north-korean-it-worker-scheme-facilitators-jailed-in-the-n6t3g/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/news/news-017.png</image:loc>
      <image:title>North Korean IT Scheme Facilitators Jailed in US Court</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6494/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/vulnerability/vulnerability-052.png</image:loc>
      <image:title>CVE-2026-6494 — The AAP MCP Server Vulnerability</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6439/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/vulnerability/vulnerability-041.png</image:loc>
      <image:title>CVE-2026-6439 — Cross-Site Scripting (XSS)</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-23778/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/vulnerability/vulnerability-013.png</image:loc>
      <image:title>Dell PowerProtect Zero-Day: Command Injection Flaw Exposes Data Domain Systems</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-23775/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/vulnerability/vulnerability-010.png</image:loc>
      <image:title>Dell DD OS Log File Vulnerability Exposes Credentials</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2025-36568/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/vulnerability/vulnerability-002.png</image:loc>
      <image:title>Dell PowerProtect BoostFS Credential Exposure Vulnerability</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6451/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/vulnerability/vulnerability-044.png</image:loc>
      <image:title>CVE-2026-6451 — The cms-fuer-motorrad-werkstaetten plugin for WordPress is</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-40002/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/vulnerability/vulnerability-043.png</image:loc>
      <image:title>CVE-2026-40002 — Red Magic 11 Pro (NX809J) contains a vulnerability that</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-33392/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/vulnerability/vulnerability-029.png</image:loc>
      <image:title>JetBrains YouTrack RCE Flaw: High Privileges, Sandbox Bypass</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-23853/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/vulnerability/vulnerability-015.png</image:loc>
      <image:title>Dell PowerProtect Data Domain: Critical Weak Credentials Vulnerability</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/microsoft-some-windows-servers-enter-reboot-loops-after-apr-xs7dz/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/news/news-007.png</image:loc>
      <image:title>Microsoft Servers Hit by April Patch Causing Domain Controller Reboot Loops</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6443/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/vulnerability/vulnerability-043.png</image:loc>
      <image:title>Malicious Takeover of WordPress Plugin: CVE-2026-6443 Backdoor Injected</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6441/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/vulnerability/vulnerability-042.png</image:loc>
      <image:title>CVE-2026-6441 — The Canto plugin for WordPress is vulnerable to Missing</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-4659/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/vulnerability/vulnerability-023.png</image:loc>
      <image:title>Elementor Plugin Flaw Exposes WordPress to Arbitrary File Read</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nist-limits-cve-enrichment-after-263-surge-in-vulnerability-q9on4/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/news/news-008.png</image:loc>
      <image:title>NIST NVD Overload: CVE Enrichment Limited After Massive Surge</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/53-ddos-domains-taken-down-by-law-enforcement-580ad/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/news/news-001.png</image:loc>
      <image:title>Law Enforcement Dismantles 53 DDoS-for-Hire Domains</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1707304340-2273/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/news/news-015.png</image:loc>
      <image:title>OpenAI&apos;s GPT-5.4-Cyber: AI Offensive, Defensive Dual-Use Dilemma Intensifies</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6421/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/vulnerability/vulnerability-039.png</image:loc>
      <image:title>MobaXterm Vulnerability: Local Privilege Escalation Risk</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-5797/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/vulnerability/vulnerability-035.png</image:loc>
      <image:title>CVE-2026-5797 — Code Execution</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-34018/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/vulnerability/vulnerability-031.png</image:loc>
      <image:title>CVE-2026-34018 — SQL Injection</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-21719/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/vulnerability/vulnerability-008.png</image:loc>
      <image:title>CubeCart Admin Command Injection: A High-Risk Vulnerability for E-commerce</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/recently-leaked-windows-zero-days-now-exploited-in-attacks-flo7m/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/news/news-012.png</image:loc>
      <image:title>Windows Zero-Days Under Active Exploitation: Escalating Privileges Now</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/operation-poweroff-seizes-53-ddos-domains-exposes-3-million-cr92j/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/news/news-009.png</image:loc>
      <image:title>Operation PowerOFF Dismantles DDoS-for-Hire Infrastructure</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6080/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/vulnerability/vulnerability-037.png</image:loc>
      <image:title>CVE-2026-6080 — SQL Injection</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-5807/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/vulnerability/vulnerability-036.png</image:loc>
      <image:title>Vault DoS: Unauthenticated Attackers Can Block Critical Operations</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-5502/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/vulnerability/vulnerability-032.png</image:loc>
      <image:title>CVE-2026-5502 — The Tutor LMS – eLearning and online course solution plugin</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-5427/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/vulnerability/vulnerability-031.png</image:loc>
      <image:title>CVE-2026-5427 — Arbitrary File Access</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-5234/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/vulnerability/vulnerability-030.png</image:loc>
      <image:title>CVE-2026-5234 — The LatePoint plugin for WordPress is vulnerable to</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-4853/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/vulnerability/vulnerability-026.png</image:loc>
      <image:title>CVE-2026-4853 — Path Traversal</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-3330/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/vulnerability/vulnerability-027.png</image:loc>
      <image:title>CVE-2026-3330 — SQL Injection</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/amtrak-2-147-679-breached-accounts-9ocwa/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/threats/threats-001.png</image:loc>
      <image:title>Amtrak Data Breach: 2M Accounts Exposed by ShinyHunters</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-5052/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/vulnerability/vulnerability-027.png</image:loc>
      <image:title>CVE-2026-5052 — Information Disclosure</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-4666/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/vulnerability/vulnerability-024.png</image:loc>
      <image:title>CVE-2026-4666 — The wpForo Forum plugin for WordPress is vulnerable to</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-4525/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/vulnerability/vulnerability-022.png</image:loc>
      <image:title>Vault Token Forwarding Flaw Exposes Auth Backends</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-3605/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/vulnerability/vulnerability-042.png</image:loc>
      <image:title>Vault Vulnerability: Authenticated Users Can Trigger DoS via Path Glob Policy</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-5231/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/vulnerability/vulnerability-029.png</image:loc>
      <image:title>WordPress WP Statistics XSS: A Silent Admin Page Threat</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-5162/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/vulnerability/vulnerability-028.png</image:loc>
      <image:title>CVE-2026-5162 — Cross-Site Scripting (XSS)</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-4817/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/vulnerability/vulnerability-025.png</image:loc>
      <image:title>CVE-2026-4817 — SQL Injection</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-3488/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/vulnerability/vulnerability-034.png</image:loc>
      <image:title>CVE-2026-3488 — The WP Statistics plugin for WordPress is vulnerable to</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-40265/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/vulnerability/vulnerability-049.png</image:loc>
      <image:title>CVE-2026-40265 — Note Mark is an open-source note-taking application. In</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-40262/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/vulnerability/vulnerability-048.png</image:loc>
      <image:title>Note Mark XSS: Magic Bytes Fail, Sessions Exposed</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-22734/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/pool/vulnerability/vulnerability-009.png</image:loc>
      <image:title>Cloud Foundry UAA Bypass: Unsigned SAML Exposes Identity Tokens</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-40322/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1510511459019-5dda7724fd87?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Critical RCE in SiYuan PKM: XSS to Arbitrary Code Execution</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-40318/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1555949963-ff9fe0c870eb?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>SiYuan Path Traversal: Arbitrary File Deletion Exposes Core Configuration</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-40259/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1510511459019-5dda7724fd87?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>SiYuan Vulnerability: Reader Role Can Wipe Attribute Views</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-40255/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1555949963-ff9fe0c870eb?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>CVE-2026-40255 — All AdonisJS Applications That Use Response.Redirect().Back( Vulnerability</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-40253/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1550751827-4bd374c3f58b?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>CVE-2026-40253 — All Token Backends (Soft, ICA, CCA, TPM, EP11, ICSF) Since T Out-of-Bounds $1</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2024-58343/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1633265486064-086b219458ec?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>CVE-2024-58343 — Vision Helpdesk before 5.7.0 (patched in 5.6.10) allows</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41113/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1555949963-ff9fe0c870eb?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Qmail RCE: A Legacy Mailer&apos;s Critical Flaw</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-40170/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1548092372-0d1bd40894a3?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>ngtcp2 QUIC Stack Overflow: A Critical Vulnerability for Qlog Deployments</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-34164/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1555949963-ff9fe0c870eb?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>CVE-2026-34164 — Valtimo is an open-source business process automation</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-33472/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1558459654-c430be5b0a44?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>CVE-2026-33472 — Cryptomator is an open-source client-side encryption</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/a-deep-dive-into-attempted-exploitation-of-cve-2023-33538-q9k7h/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1562813733-b31f71025d54?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>CVE-2023-33538: Mirai Botnet Targets TP-Link Routers</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nist-revamps-cve-framework-to-focus-on-high-impact-vulnerabi-16ahq/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/feed/ai-is-accelerating-the-cybersecurity-timeline.png</image:loc>
      <image:title>NIST Overhauls CVE Framework for High-Impact Vulnerability Prioritization</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1500098925-279/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/feed/ai-is-accelerating-the-cybersecurity-timeline.png</image:loc>
      <image:title>Project Glasswing Is Not Just Another AI Security Announcement</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6442/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1563206767-5b18f218e8de?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Snowflake Cortex Code CLI Sandbox Escape Vulnerability</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2025-43937/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1550751827-4bd374c3f58b?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>CVE-2025-43937 — Dell PowerScale OneFS, versions prior to 9.12.0.0, contains</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2025-43935/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1558459654-c430be5b0a44?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>CVE-2025-43935 — Denial of Service</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1500098925-276/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1597862624146-142dbb8acfab?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>GodPotato Exploit Now Operational with Cobalt Strike BOF</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41082/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1596457233038-45a990575b2e?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>OCaml opam Path Traversal: A Nasty CVE-2026-41082</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-24749/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1596457233038-45a990575b2e?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>CVE-2026-24749 — The Silverstripe Assets Module is a required component of</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2025-43883/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1614064641938-3bbee52942c7?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>CVE-2025-43883 — Denial of Service</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/newly-discovered-powmix-botnet-hits-czech-workers-using-rand-v2hlp/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1770159116807-9b2a7bb82294?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>PowMix Botnet Targets Czech Workforce with Evasive C2</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1427288221-8778/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1542831371-29b0f74f9713?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Crypto Wild West: Millions Vanish in Daily Exploits</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2025-36579/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1614064641938-3bbee52942c7?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>CVE-2025-36579 — Dell Client Platform BIOS contains a Weak Password Recovery</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/hackers-exploit-marimo-flaw-to-deploy-nkabuse-malware-from-h-n1iiz/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1591439657848-9f4b9ce436b9?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Hackers Exploit Marimo Flaw, Deploy NKAbuse via Hugging Face</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/new-jersey-men-given-lengthy-sentences-for-running-north-kor-hnxb2/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1680992044138-ce4864c2b962?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>NJ Men Sentenced for North Korean Laptop Farms</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-3324/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1614064641938-3bbee52942c7?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Zoho ManageEngine Log360 Hit by Auth Bypass</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-33804/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1563206767-5b18f218e8de?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Fastify Middie Bypass: Double Slashes, Double Trouble</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-2840/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1510511459019-5dda7724fd87?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>CVE-2026-2840 — Cross-Site Scripting (XSS)</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6410/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1555949963-ff9fe0c870eb?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>CVE-2026-6410 — Path Traversal</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6270/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1558459654-c430be5b0a44?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Fastify Middleware Flaw Exposes Apps to Auth Bypass</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-5785/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1563206767-5b18f218e8de?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>SQL Injection Flaw Found in Zoho ManageEngine PAM/PMP</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-4160/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1563206767-5b18f218e8de?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>CVE-2026-4160 — The Fluent Forms – Customizable Contact Forms, Survey,</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6414/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1510511459019-5dda7724fd87?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>CVE-2026-6414 — @fastify/static versions 8.0.0 through 9.1.0 decode</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-31843/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1558459654-c430be5b0a44?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Critical RCE in Laravel Payment Package</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/cargo-thieving-hackers-running-sophisticated-remote-access-c-p5ovh/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1680992046626-418f7e910589?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Hackers Pilfering Cargo via Sophisticated Digital Campaigns</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/threatsday-bulletin-defender-0-day-sonicwall-brute-force-bofvm/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1558459654-c430be5b0a44?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Defender 0-Day &amp; Excel RCE Among Week&apos;s Top Threats</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/data-breach-at-tennessee-hospital-affects-337-000-2h1hl/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1596457233038-45a990575b2e?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Rhysida Ransomware Hits Tennessee Hospital, Leaks 500GB Data</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-3489/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1596457233038-45a990575b2e?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>DirectoryPress Plugin Flaw Exposes WordPress Sites to SQL Injection</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-3369/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1550751827-4bd374c3f58b?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>CVE-2026-3369 — Cross-Site Scripting (XSS)</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/cisco-says-critical-webex-services-flaw-requires-customer-ac-nupgy/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1633265486064-086b219458ec?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Cisco Webex Flaw Demands Immediate Customer Action</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/ukrainian-emergency-services-and-hospitals-hit-by-espionage-58z9k/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1760199789455-49098afd02f0?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>New AgingFly Malware Hits Ukrainian Emergency Services and Hospitals</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/webinar-find-and-eliminate-orphaned-non-human-identities-i-myqne/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1666615435088-4865bf5ed3fd?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Orphaned Identities Fueling Cloud Breaches: The Unseen Threat</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/cisco-patches-four-critical-identity-services-webex-flaws-e-rb2is/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1614064641938-3bbee52942c7?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Cisco Patches Critical Flaws in Identity Services and Webex</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2025-12624/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1526374965328-7f61d4dc18c5?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>CVE-2025-12624 — Active access tokens are not revoked or invalidated when a</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/obsidian-plugin-abuse-delivers-phantompulse-rat-in-targeted-vlu5o/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1618060932014-4deda4932554?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Obsidian Plugin Abuse Unleashes Novel PHANTOMPULSE RAT</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nist-prioritizes-nvd-enrichment-for-cves-in-cisa-kev-critic-1vc2u/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1548092372-0d1bd40894a3?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>NIST NVD Prioritizes CISA KEV and Critical Software CVEs</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/data-breach-at-edtech-giant-mcgraw-hill-affects-13-5-million-121kn/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1618060932014-4deda4932554?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>McGraw Hill Breach: 13.5 Million Accounts Leaked by ShinyHunters</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2025-6024/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1526374965328-7f61d4dc18c5?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>CVE-2025-6024 — The authentication endpoint fails to encode user-supplied</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2024-4867/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1633265486064-086b219458ec?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>CVE-2024-4867 — Cross-Site Scripting (XSS)</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2024-10242/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1563206767-5b18f218e8de?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>CVE-2024-10242 — The authentication endpoint fails to adequately validate</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-23772/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1548092372-0d1bd40894a3?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Dell Storage Manager Flaw: Local Privilege Escalation Risk</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2024-2374/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1614064641938-3bbee52942c7?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>WSO2 XML Parsers Vulnerable to External Entity Attacks</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/claude-code-gemini-cli-github-copilot-agents-vulnerable-to-mv29t/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1753998941540-081eed4f6397?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>AI Agents Vulnerable to &apos;Comment and Control&apos; Prompt Injection</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-0718/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1596457233038-45a990575b2e?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>CVE-2026-0718 — The Post Grid Gutenberg Blocks for News, Magazines, Blog</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2025-14868/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1563206767-5b18f218e8de?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>WordPress Plugin Zero-Day: CSRF to Arbitrary File Deletion</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41035/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1526374965328-7f61d4dc18c5?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Rsync Vulnerability Exposes Users to Use-After-Free Flaw</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41034/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1548092372-0d1bd40894a3?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>CVE-2026-41034 — ONLYOFFICE DocumentServer before 9.3.0 has an untrusted</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41030/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1563206767-5b18f218e8de?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>CVE-2026-41030 — In ONLYOFFICE DesktopEditors before 9.3.0, the update</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-3995/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1510511459019-5dda7724fd87?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>CVE-2026-3995 — Cross-Site Scripting (XSS)</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-3876/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1550751827-4bd374c3f58b?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Prismatic Plugin Flaw Exposes WordPress Sites to XSS Attacks</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-3875/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1614064641938-3bbee52942c7?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>CVE-2026-3875 — Cross-Site Scripting (XSS)</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-3861/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1550751827-4bd374c3f58b?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>CVE-2026-3861 — LINE client for iOS versions prior to 26.3.0 contains a</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-3355/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1633265486064-086b219458ec?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>CVE-2026-3355 — Cross-Site Scripting (XSS)</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-1620/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1550751827-4bd374c3f58b?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Elementor Addon Vulnerability Exposes WordPress Sites to RCE</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-1572/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1596457233038-45a990575b2e?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>CVE-2026-1572 — Cross-Site Scripting (XSS)</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2025-13364/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1510511459019-5dda7724fd87?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>CVE-2025-13364 — Cross-Site Scripting (XSS)</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/uac-0247-targets-ukrainian-clinics-and-government-in-data-th-qk8gk/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1760199789463-b523db55dd8b?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Malware Campaign Hits Ukrainian Clinics, Government Agencies</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-5050/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1633265486064-086b219458ec?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Redsys &amp; WooCommerce Flaw Allows Payment Forgery</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-3773/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1596457233038-45a990575b2e?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>CVE-2026-3773 — SQL Injection</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-3614/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1614064641938-3bbee52942c7?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>WordPress Plugin Flaw Lets Subscribers Hijack Admin Accounts</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-3599/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1633265486064-086b219458ec?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>WordPress Riaxe Plugin Rife with SQLi Vulnerability</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-3596/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1633265486064-086b219458ec?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Critical WordPress Plugin Flaw: Riaxe Product Customizer Privilege Escalation</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-3595/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1555949963-ff9fe0c870eb?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>CVE-2026-3595 — The Riaxe Product Customizer plugin for WordPress is</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-3581/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1550751827-4bd374c3f58b?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>CVE-2026-3581 — The Basic Google Maps Placemarks plugin for WordPress is</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-3551/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1633265486064-086b219458ec?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>CVE-2026-3551 — Cross-Site Scripting (XSS)</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-22619/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1563206767-5b18f218e8de?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Eaton IPP Vulnerability Opens Door for Code Execution</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-22618/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1510511459019-5dda7724fd87?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>CVE-2026-22618 — A security misconfiguration was identified in Eaton</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-22617/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1555949963-ff9fe0c870eb?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>CVE-2026-22617 — Eaton Intelligent Power Protector (IPP) uses an insecure</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-40118/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1596457233038-45a990575b2e?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>CVE-2026-40118 — Information Disclosure</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-22616/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1550751827-4bd374c3f58b?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>CVE-2026-22616 — Eaton Intelligent Power Protector (IPP) software allows</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-22615/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1558459654-c430be5b0a44?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>CVE-2026-22615 — Due to improper input validation in one of the Eaton</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2023-5872/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1558459654-c430be5b0a44?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>CVE-2023-5872 — In Wago Smart Designer in versions up to 2.33.1 a low</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2023-3634/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1633265486064-086b219458ec?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Festo MSE6 Products Vulnerable to High-Severity Remote Exploit</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-5070/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1563206767-5b18f218e8de?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>CVE-2026-5070 — Cross-Site Scripting (XSS)</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-4032/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1510511459019-5dda7724fd87?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>CVE-2026-4032 — Cross-Site Scripting (XSS)</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-3878/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1548092372-0d1bd40894a3?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>CVE-2026-3878 — Cross-Site Scripting (XSS)</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6351/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1526374965328-7f61d4dc18c5?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>MailGates/MailAudit CRLF Injection Exposes System Files</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6350/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1555949963-ff9fe0c870eb?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Critical MailGates Flaw Lets Attackers Run Wild</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6348/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1548092372-0d1bd40894a3?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>WinMatrix Agent: Local Auth Bypass to SYSTEM Privileges</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41015/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1614064641938-3bbee52942c7?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Radare2 Vulnerability: Command Injection via PDB Name</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-3885/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1510511459019-5dda7724fd87?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>CVE-2026-3885 — Cross-Site Scripting (XSS)</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-40962/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1633265486064-086b219458ec?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>CVE-2026-40962 — Out-of-Bounds $1</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-40504/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1510511459019-5dda7724fd87?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Critical Heap Overflow in Creolabs Gravity Exposes Arbitrary Code Execution</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-3299/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1550751827-4bd374c3f58b?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>CVE-2026-3299 — Cross-Site Scripting (XSS)</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-40960/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1555949963-ff9fe0c870eb?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Luanti Vulnerability Exposes Insecure Environments via Crafted Mods</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-40959/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1563206767-5b18f218e8de?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Critical LuaJIT Sandbox Escape in Luanti 5</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-40503/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1614064641938-3bbee52942c7?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>CVE-2026-40503 — Path Traversal</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-40502/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1563206767-5b18f218e8de?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>OpenHarness Command Injection: Remote Admin Control Via Chat</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/big-tech-fails-to-opt-out-users-requesting-not-to-be-tracked-kiyc8/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1487058792275-0ad4aaf24ca7?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Big Tech Fails to Honor User Opt-Out Requests</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-4880/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1555949963-ff9fe0c870eb?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Critical WordPress Plugin Flaw Grants Admin Privileges</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-40245/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1510511459019-5dda7724fd87?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Free5GC UDR Service Leaks 5G Subscriber Identifiers</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-40193/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1558459654-c430be5b0a44?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Maddy Mail Server Hit by Critical LDAP Injection Flaw</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-4949/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1558459654-c430be5b0a44?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>CVE-2026-4949 — The Paid Membership Plugin, Ecommerce, User Registration</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-40316/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1526374965328-7f61d4dc18c5?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>OWASP BLT RCE: GitHub Workflow Flaw Exposes Secrets</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-39350/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1548092372-0d1bd40894a3?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>CVE-2026-39350 — Istio is an open platform to connect, manage, and secure</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6388/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1633265486064-086b219458ec?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>ArgoCD Image Updater Flaw Bypasses Namespace Boundaries</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-40500/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1510511459019-5dda7724fd87?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>CVE-2026-40500 — The Admin Panel&apos;S &apos;Add Module From URL&apos; Feature That Server-Side Request Forgery</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-40261/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1563206767-5b18f218e8de?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Composer Command Injection: Malicious Repositories are a New Vector</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-40186/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1563206767-5b18f218e8de?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>CVE-2026-40186 — Non-Default Configurations Where Option Or Textarea Are Incl Cross-Site Scripting (XSS)</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-40173/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1614064641938-3bbee52942c7?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Critical Dgraph Flaw Leaks Admin Tokens, Bypassing Authentication</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-22676/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1548092372-0d1bd40894a3?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Barracuda RMM Flaw Grants SYSTEM Privileges</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/wordpress-plugin-suite-hacked-to-push-malware-to-thousands-o-rbm4a/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1760199789455-49098afd02f0?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>WordPress EssentialPlugin Suite Compromised, Thousands of Sites at Risk</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6363/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1555949963-ff9fe0c870eb?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Chrome V8 Type Confusion: Remote OOB Access Risk</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6360/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1550751827-4bd374c3f58b?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Chrome &apos;Use-After-Free&apos; Bug: High Severity RCE Risk</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6359/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1558459654-c430be5b0a44?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Chrome Video Bug: Renderer Compromise Leads to High-Severity RCE</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6358/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1633265486064-086b219458ec?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Critical Use-After-Free Bug Hits Chrome on Android</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6317/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1596457233038-45a990575b2e?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Chrome &apos;Use-After-Free&apos; Bug: Remote Code Execution Risk</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6316/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1526374965328-7f61d4dc18c5?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Chrome Zero-Day: Use-After-Free Flaw Exposes Users to RCE</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6315/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1633265486064-086b219458ec?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Chrome Android Bug: High-Severity Use-After-Free Exploit</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6307/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1526374965328-7f61d4dc18c5?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Chrome Turbofan Bug Allows Remote Code Execution in Sandbox</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6302/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1596457233038-45a990575b2e?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Chrome&apos;s &apos;Use-After-Free&apos; Bug: Remote Code Execution Risk</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6301/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1550751827-4bd374c3f58b?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Chrome Turbofan Bug: Remote Code Execution Threat</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6300/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1633265486064-086b219458ec?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Chrome Zero-Day: Use-After-Free in CSS Poses High Risk</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6299/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1563206767-5b18f218e8de?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Critical Chrome &apos;Use-After-Free&apos; Vulnerability Uncovered</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6297/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1548092372-0d1bd40894a3?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Critical Chrome Proxy Bug Allows Sandbox Escape</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-35569/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1596457233038-45a990575b2e?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>ApostropheCMS Flaw: Stored XSS Puts User Data at Risk</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2025-41118/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1510511459019-5dda7724fd87?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Critical RCE in Pyroscope&apos;s Tencent COS Backend</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/daily-digest/</loc>
    <image:image>
      <image:loc>https://shimiscyberworld.com/assets/images/covers/threat-intel.svg</image:loc>
      <image:title>Daily Security Digest — 2026-04-15</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6383/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1563206767-5b18f218e8de?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>CVE-2026-6383 — KubeVirt&apos;S Role-Based Access Control (RBAC) Evaluation Logic Vulnerability</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6245/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1548092372-0d1bd40894a3?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>CVE-2026-6245 — The System Security Services Daemon (SSSD) Denial of Service</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-4857/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1550751827-4bd374c3f58b?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>IdentityIQ Flaw Allows Unauthorized Object Creation</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-40256/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1633265486064-086b219458ec?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>CVE-2026-40256 — Weblate is a web based localization tool. In versions prior</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-39845/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1510511459019-5dda7724fd87?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>CVE-2026-39845 — Server-Side Request Forgery</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-34632/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1548092372-0d1bd40894a3?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Photoshop Installer Vulnerability Allows Arbitrary Code Execution</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-34393/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1550751827-4bd374c3f58b?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Weblate Flaw Exposes User Data, High-Severity Patch Issued</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-34244/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1555949963-ff9fe0c870eb?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>CVE-2026-34244 — Server-Side Request Forgery</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-34242/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1555949963-ff9fe0c870eb?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Weblate ZIP Feature Exposes Systems to Symlink Traversal</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-33667/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1596457233038-45a990575b2e?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>OpenProject 2FA Bypass: Brute-Force Vulnerability Uncovered</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-33440/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1633265486064-086b219458ec?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>CVE-2026-33440 — Weblate is a web based localization tool. In versions prior</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-33435/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1633265486064-086b219458ec?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Weblate Vulnerability Allows RCE via Project Backups</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-33220/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1633265486064-086b219458ec?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>CVE-2026-33220 — Weblate is a web based localization tool. In versions prior</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6290/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1563206767-5b18f218e8de?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Velociraptor Vulnerability Exposes Multi-Org Data</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-33214/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1526374965328-7f61d4dc18c5?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>CVE-2026-33214 — Weblate is a web based localization tool. In versions prior</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-32631/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1550751827-4bd374c3f58b?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Git for Windows NTLM Hash Leak Poses Credential Risk</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6372/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1596457233038-45a990575b2e?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Plisio Plugin Flaw: Unauthenticated Access Control Bypass</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6370/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1550751827-4bd374c3f58b?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>CVE-2026-6370 — HashThemes Mini Ajax Cart For WooCommerce Cross-Site Scripting (XSS)</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-20186/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1563206767-5b18f218e8de?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Critical Cisco ISE RCE: Authenticated Attackers Can Gain Root</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-20184/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1558459654-c430be5b0a44?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Cisco Webex SSO Flaw: Critical Impersonation Risk</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-20180/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1526374965328-7f61d4dc18c5?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Critical Cisco ISE RCE: Authenticated Attackers Can Gain Root</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-20170/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1558459654-c430be5b0a44?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>CVE-2026-20170 — The Desktop Agent Functionality Of Cisco Webex Contact Cente Cross-Site Scripting (XSS)</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-20161/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1550751827-4bd374c3f58b?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>CVE-2026-20161 — The CLI Of Cisco ThousandEyes Enterprise Agent Improper Access Control</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-20152/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1548092372-0d1bd40894a3?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>CVE-2026-20152 — The Authentication Service Feature Of Cisco AsyncOS Software Vulnerability</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-20147/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1526374965328-7f61d4dc18c5?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Critical Cisco ISE RCE: Authenticated Admin Can Achieve Root</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-20136/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1548092372-0d1bd40894a3?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>CVE-2026-20136 — The&amp;Nbsp;CLI Of Cisco Identity Services Engine (ISE) And Cis Command Injection</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-20081/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1558459654-c430be5b0a44?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>CVE-2026-20081 — Arbitrary File Access</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-20078/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1555949963-ff9fe0c870eb?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>CVE-2026-20078 — Arbitrary File Access</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-20059/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1548092372-0d1bd40894a3?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>CVE-2026-20059 — The Web-Based Management Interface Of Cisco Unity Connection Cross-Site Scripting (XSS)</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2025-63029/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1614064641938-3bbee52942c7?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>WCFM Marketplace SQLi: High-Severity Flaw Patched</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2025-15636/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1563206767-5b18f218e8de?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>CVE-2025-15636 — Emarket-Design YouTube Showcase Cross-Site Scripting (XSS)</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/n8n-webhooks-abused-since-october-2025-to-deliver-malware-vi-d64e2/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1618060932014-4deda4932554?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>n8n Webhooks Abused for Malware Delivery via Phishing</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-20205/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1550751827-4bd374c3f58b?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Splunk MCP Server Bug Exposes Session Tokens</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-20204/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1550751827-4bd374c3f58b?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Splunk RCE: Low-Privilege Users Could Gain Remote Code Execution</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-20203/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1614064641938-3bbee52942c7?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>CVE-2026-20203 — Improper Access Control</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-20202/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1563206767-5b18f218e8de?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>CVE-2026-20202 — In Splunk Enterprise versions below 10.2.2, 10.0.5, 9.4.10,</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2025-53444/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1596457233038-45a990575b2e?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>CVE-2025-53444 — DeluxeThemes Userpro Vulnerability</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/cisa-flags-windows-task-host-vulnerability-as-exploited-in-a-b7jps/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1548092372-0d1bd40894a3?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>CISA Flags Exploited Windows Task Host Vulnerability</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/capsule-security-emerges-from-stealth-with-7-million-in-fun-wgklo/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1583695477819-357b45d15825?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Capsule Security Raises $7M to Defend AI Agents</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/by-design-flaw-in-mcp-could-enable-widespread-ai-supply-ch-m7zwm/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1558459654-c430be5b0a44?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Anthropic&apos;s AI Protocol Has Design Flaw Enabling Supply Chain Attacks</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/actively-exploited-nginx-ui-flaw-cve-2026-33032-enables-fu-yjwqk/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1548092372-0d1bd40894a3?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Nginx-UI Flaw CVE-2026-33032 Actively Exploited for Server Takeover</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/microsoft-salesforce-patch-ai-agent-data-leak-flaws-ofz51/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1526374965328-7f61d4dc18c5?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>AI Agents Prone to Data Leaks, Microsoft and Salesforce Patch Flaws</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/deterministic-agentic-ai-the-architecture-exposure-valida-cb8cm/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1504639725590-34d0984388bd?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>AI Security Exposure: Boardroom Mandate Meets Reality Check</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1427288221-8769/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1542831371-29b0f74f9713?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Phishing Campaign Impersonates Israeli Fines Collection Center</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/ics-patch-tuesday-8-industrial-giants-publish-new-security-wflr2/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1550751827-4bd374c3f58b?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>ICS Patch Tuesday: Industrial Giants Issue Critical Advisories</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1427288221-8768/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1550751827-4bd374c3f58b?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Old Accounts, New Dangers: The Unseen Attack Vector</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1427288221-8765/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1579397256979-cc326aefe273?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Avatar Aang Leaked: Nickelodeon Breach Rumors Swirl</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/openai-launches-gpt-5-4-cyber-with-expanded-access-for-secur-ur50q/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1563206767-5b18f218e8de?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>OpenAI Unleashes GPT-5.4-Cyber for Defensive Security</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-39399/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1510511459019-5dda7724fd87?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Critical RCE Flaw Hits NuGet Gallery Backend</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-39387/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1548092372-0d1bd40894a3?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>BoidCMS LFI to RCE: A Critical Template Flaw</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-35589/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1555949963-ff9fe0c870eb?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Nanobot AI: WebSocket Hijack Puts WhatsApp Sessions at Risk</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-35031/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1558459654-c430be5b0a44?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Jellyfin RCE: Critical Flaw Chains Arbitrary File Write to Root</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-34457/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1548092372-0d1bd40894a3?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>OAuth2 Proxy Auth Bypass Critical Vulnerability (CVE-2026-34457)</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-33023/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1558459654-c430be5b0a44?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Libsixel Use-After-Free: Crafted Images Lead to RCE</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-33021/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1563206767-5b18f218e8de?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>libsixel Use-After-Free: High-Severity Bug in Image Handling</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-27298/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1555949963-ff9fe0c870eb?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Adobe FrameMaker Type Confusion Opens Door to RCE</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-27297/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1548092372-0d1bd40894a3?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Adobe FrameMaker Integer Underflow Could Lead to RCE</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-27296/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1550751827-4bd374c3f58b?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Adobe FrameMaker Hit by High-Severity Integer Underflow</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-27295/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1526374965328-7f61d4dc18c5?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Adobe Framemaker Vulnerability: Arbitrary Code Execution Risk</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-27294/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1596457233038-45a990575b2e?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Adobe Framemaker Vulnerability: Code Execution Risk</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-27293/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1558459654-c430be5b0a44?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Adobe FrameMaker Heap Overflow: Arbitrary Code Execution Risk</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-27292/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1563206767-5b18f218e8de?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Adobe Framemaker Use-After-Free Flaw Allows Arbitrary Code Execution</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-27290/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1633265486064-086b219458ec?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Adobe FrameMaker Hit by Untrusted Search Path Flaw</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-40291/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1633265486064-086b219458ec?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Chamilo LMS Privilege Escalation: Student to Admin in a Snap</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-35196/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1555949963-ff9fe0c870eb?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Chamilo LMS OS Command Injection: A Session Poisoning Nightmare</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-34631/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1596457233038-45a990575b2e?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Adobe InCopy Zero-Day: Arbitrary Code Execution Risk</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-34619/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1550751827-4bd374c3f58b?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>ColdFusion Path Traversal Poses High Risk</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-34602/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1548092372-0d1bd40894a3?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Chamilo LMS IDOR Flaw Exposes User-Course Enrollments</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-34370/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1596457233038-45a990575b2e?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>CVE-2026-34370 — Chamilo LMS is an open-source learning management system.</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-34213/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1555949963-ff9fe0c870eb?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>CVE-2026-34213 — Docmost is open-source collaborative wiki and documentation</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-34212/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1558459654-c430be5b0a44?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>CVE-2026-34212 — Docmost is open-source collaborative wiki and documentation</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-33020/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1550751827-4bd374c3f58b?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Libsixel Integer Overflow Leads to Heap Corruption</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-33019/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1563206767-5b18f218e8de?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>libsixel Integer Overflow Leads to Heap OOB Read, Info Disclosure</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-33018/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1548092372-0d1bd40894a3?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>libsixel Use-After-Free: Critical Flaw in GIF Processing</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-27306/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1555949963-ff9fe0c870eb?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>ColdFusion Code Execution Flaw: CVE-2026-27306 Requires Elevated Privileges</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-27305/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1558459654-c430be5b0a44?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>ColdFusion Path Traversal Exposes Arbitrary File Reads</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-27304/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1614064641938-3bbee52942c7?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>ColdFusion Flaw: Critical RCE Threat Looms Large</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-27282/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1526374965328-7f61d4dc18c5?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>ColdFusion Flaw Allows Security Bypass</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-34160/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1563206767-5b18f218e8de?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Chamilo LMS SSRF: Unauthenticated Attack Poses High Risk</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-33715/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1526374965328-7f61d4dc18c5?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Chamilo LMS SSRF Flaw: Unauthenticated Email Relay Risk</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-27287/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1633265486064-086b219458ec?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Adobe InCopy Zero-Day: Out-of-Bounds Read Poses High Risk</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-25125/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1548092372-0d1bd40894a3?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>CVE-2026-25125 — The INI Settings Parser. Because PHP&apos;S Parse_ini_string() Fu Information Disclosure</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-24893/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1558459654-c430be5b0a44?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>openITCOCKPIT Command Injection: RCE for Authenticated Users</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-40683/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1555949963-ff9fe0c870eb?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>OpenStack Keystone LDAP Flaw Exposes Disabled Users</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-34630/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1633265486064-086b219458ec?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Bridge Software Hit by High-Severity Heap Overflow</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-34618/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1510511459019-5dda7724fd87?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Illustrator Bug: Arbitrary Code Execution via Malicious Files</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-27313/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1550751827-4bd374c3f58b?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Bridge Software Hit by Heap Buffer Overflow: RCE Risk</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-27312/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1555949963-ff9fe0c870eb?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Bridge Heap Buffer Overflow: Arbitrary Code Execution Risk</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-27311/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1548092372-0d1bd40894a3?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Bridge Heap-based Buffer Overflow Exploitable Via Malicious Files</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-27310/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1614064641938-3bbee52942c7?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Bridge Software Hit by High-Severity Heap Overflow</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-27289/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1548092372-0d1bd40894a3?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Photoshop Out-of-Bounds Read: RCE Risk for Desktop Users</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-27222/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1558459654-c430be5b0a44?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>CVE-2026-27222 — Bridge versions 16.0.2, 15.1.4 and earlier are affected by</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/new-janaware-ransomware-targeting-turkish-citizens-as-cybe-b99l5/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1618060932014-4deda4932554?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>JanaWare Ransomware: Turkish Citizens in the Crosshairs</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-34625/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1633265486064-086b219458ec?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>CVE-2026-34625 — Cross-Site Scripting (XSS)</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-34624/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1548092372-0d1bd40894a3?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>CVE-2026-34624 — Cross-Site Scripting (XSS)</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-34623/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1596457233038-45a990575b2e?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>CVE-2026-34623 — Cross-Site Scripting (XSS)</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-34617/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1596457233038-45a990575b2e?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Adobe Connect XSS Flaw: Privilege Escalation Risk</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-34615/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1510511459019-5dda7724fd87?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Critical Adobe Connect RCE: Deserialization Flaw Puts Users at Risk</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-33824/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1614064641938-3bbee52942c7?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Critical Windows IKE Flaw: Network Code Execution Risk</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-33120/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1550751827-4bd374c3f58b?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>SQL Server RCE: Untrusted Pointer Dereference</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-32225/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1614064641938-3bbee52942c7?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Windows Shell Flaw Bypasses Core Security</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-32171/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1563206767-5b18f218e8de?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Azure Logic Apps Flaw: Privilege Escalation Risk</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-32157/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1558459654-c430be5b0a44?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>RDP Client Vulnerability: Remote Code Execution via Use-After-Free</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-27928/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1558459654-c430be5b0a44?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Windows Hello Flaw: Network Bypass Possible</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-27303/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1633265486064-086b219458ec?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Adobe Connect RCE Flaw: Critical Deserialization Bug Exposed</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-27246/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1563206767-5b18f218e8de?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Critical XSS Hits Adobe Connect: Patch Now!</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-27245/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1510511459019-5dda7724fd87?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Critical XSS Hits Adobe Connect: Patch Now!</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-27243/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1526374965328-7f61d4dc18c5?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Adobe Connect XSS Flaw: Critical Remote Code Execution Risk</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-26178/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1563206767-5b18f218e8de?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>WARP Vulnerability Offers Local Privilege Escalation in Windows</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-26167/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1550751827-4bd374c3f58b?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Windows Push Notifications Vulnerability: Local Privilege Escalation Risk</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-26149/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1548092372-0d1bd40894a3?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Microsoft Power Apps Flaw: Critical Remote Attack Vector Exposed</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/microsoft-patches-sharepoint-zero-day-160-vulnerabilities/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1555949963-ff9fe0c870eb?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Microsoft Patches SharePoint Zero-Day, 160 Vulnerabilities</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/microsoft-drops-windows-10-extended-security-update/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1510511459019-5dda7724fd87?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Microsoft Drops Windows 10 Extended Security Update</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/mcgraw-hill-confirms-breach-via-salesforce-misconfig/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1555949963-ff9fe0c870eb?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>McGraw-Hill Confirms Breach via Salesforce Misconfig</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/windows-11-gets-security-boost-with-latest-cumulative-update/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1614064548237-096f735f344f?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Windows 11 Gets Security Boost with Latest Cumulative Updates</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/microsofts-april-patch-tuesday-167-fixes-two-zero-days-squas/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1526374965328-7f61d4dc18c5?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Microsoft&apos;s April Patch Tuesday: 167 Fixes, Two Zero-Days Squashed</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-34626/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1510511459019-5dda7724fd87?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>CVE-2026-34626 — Arbitrary File Access</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-34622/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1563206767-5b18f218e8de?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Acrobat Reader Flaw Could Lead to Code Execution</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-27291/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1526374965328-7f61d4dc18c5?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>InDesign Flaw: Out-of-Bounds Write Allows Code Execution</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-27286/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1633265486064-086b219458ec?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>CVE-2026-27286 — Buffer Overflow</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-27285/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1633265486064-086b219458ec?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>CVE-2026-27285 — Buffer Overflow</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-27284/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1510511459019-5dda7724fd87?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>InDesign Flaw Opens Door for Remote Code Execution</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-27283/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1633265486064-086b219458ec?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Adobe InDesign Flaw Lets Attackers Execute Code via Malicious Files</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-27238/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1614064641938-3bbee52942c7?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Adobe InDesign Vulnerability: Arbitrary Code Execution Risk</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-22692/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1548092372-0d1bd40894a3?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>CVE-2026-22692 — Installations With CMS_SAFE_MODE Enabled (Disabled By Defaul Vulnerability</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/virginia-bans-sale-of-precise-geolocation-data/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1542831371-29b0f74f9713?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Virginia Bans Sale of Precise Geolocation Data</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1707304340-2270/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1558459654-c430be5b0a44?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>SAP Patches Critical SQLi and High-Severity ERP Flaws</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-39815/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1510511459019-5dda7724fd87?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Fortinet FortiDDoS-F SQLi: High-Severity RCE Risk</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-39813/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1633265486064-086b219458ec?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Fortinet Path Traversal Flaw: Critical Privilege Escalation Risk</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-39808/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1633265486064-086b219458ec?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Fortinet FortiSandbox Faces Critical Command Injection Flaw</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-38532/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1555949963-ff9fe0c870eb?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>CRM Vulnerability Lets Attackers Steal and Delete User Contacts</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-38530/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1548092372-0d1bd40894a3?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Webkul Krayin CRM: Critical Auth Flaw Lets Attackers Steal Leads</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-38529/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1633265486064-086b219458ec?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Critical BOLA Flaw Lets Attackers Hijack Webkul Krayin CRM Accounts</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-38528/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1555949963-ff9fe0c870eb?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Krayin CRM SQL Injection: High-Severity Flaw Exposes Data</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-38527/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1633265486064-086b219458ec?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Krayin CRM SSRF Exposes Internal Resources</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-38526/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1633265486064-086b219458ec?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Critical File Upload Flaw Found in Webkul Krayin CRM</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-25691/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1558459654-c430be5b0a44?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>CVE-2026-25691 — Path Traversal</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-23708/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1633265486064-086b219458ec?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>FortiSOAR 2FA Bypass: Replay Attack Raises Authentication Concerns</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-22828/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1563206767-5b18f218e8de?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Fortinet FortiAnalyzer/FortiManager Cloud: Heap Overflow Exploit</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2025-65135/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1550751827-4bd374c3f58b?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Critical SQLi Hits School Management System</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2025-63939/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1510511459019-5dda7724fd87?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Critical SQLi Hits Grocery Store Management System</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2025-61848/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1633265486064-086b219458ec?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Fortinet SQLi Hits FortiAnalyzer, FortiManager</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/php-composer-vulnerabilities-open-door-for-command-execution/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1558459654-c430be5b0a44?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>PHP Composer Vulnerabilities Open Door for Command Execution</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/microsoft-fast-tracks-windows-hardware-dev-account-reinstate/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1592609930961-219235eded71?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Microsoft Fast-Tracks Windows Hardware Dev Account Reinstatements</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-4914/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1633265486064-086b219458ec?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>CVE-2026-4914 — Cross-Site Scripting (XSS)</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-4913/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1510511459019-5dda7724fd87?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>CVE-2026-4913 — Improper protection of an alternate path in Ivanti N-ITSM</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-4369/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1555949963-ff9fe0c870eb?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Autodesk Fusion XSS: Local File Read, Code Execution Risk</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-4345/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1563206767-5b18f218e8de?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Autodesk Fusion XSS Flaw Puts Local Files, Code at Risk</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-4344/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1558459654-c430be5b0a44?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Autodesk Fusion XSS Flaw Lets Attackers Steal Local Files</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-37980/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1550751827-4bd374c3f58b?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>CVE-2026-37980 — Keycloak, Specifically In The Organization Selection Login P Cross-Site Scripting (XSS)</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2025-69993/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1614064641938-3bbee52942c7?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>CVE-2025-69993 — Cross-Site Scripting (XSS)</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/ai-fuels-google-discover-scams-with-scareware-and-ad-fraud/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1550751827-4bd374c3f58b?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>AI Fuels Google Discover Scams with Scareware and Ad Fraud</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/zero-trust-the-identity-fortress-against-stolen-credentials/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1770159116807-9b2a7bb82294?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Zero Trust: The Identity Fortress Against Stolen Credentials</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/google-hardens-pixel-10-modem-with-rust-dns-parser/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1542831371-29b0f74f9713?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Google Hardens Pixel 10 Modem with Rust DNS Parser</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/russia-censors-bluesky-amid-broader-internet-crackdown/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1579397256979-cc326aefe273?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Russia Censors Bluesky Amid Broader Internet Crackdown</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-2332/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1558459654-c430be5b0a44?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Jetty HTTP/1.1 Parser Vulnerable to Request Smuggling via Funky Chunks</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/cisa-kev-CVE-2026-32201/</loc>
    <image:image>
      <image:loc>https://shimiscyberworld.com/assets/images/covers/vulnerability.svg</image:loc>
      <image:title>CVE-2026-32201 — Microsoft SharePoint Server: Microsoft SharePoint Server Improper Input Validation Vulnerability</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/cisa-kev-CVE-2009-0238/</loc>
    <image:image>
      <image:loc>https://shimiscyberworld.com/assets/images/covers/vulnerability.svg</image:loc>
      <image:title>CVE-2009-0238 — Microsoft Office: Microsoft Office Remote Code Execution</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/sap-patches-critical-abap-vulnerability/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1555949963-ff9fe0c870eb?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>SAP Patches Critical ABAP Vulnerability</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/mirax-android-rat-meta-ads-push-socks5-proxy-malware/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1620825937374-87fc7d6bddc2?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Mirax Android RAT: Meta Ads Push SOCKS5 Proxy Malware</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/critical-risk-surges-400-amidst-ai-driven-development/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1590971862391-06cac0657603?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Critical Risk Surges 400% Amidst AI-Driven Development</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/cisa-needs-confirmed-leadership-amid-escalating-cyber-threat/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1548092372-0d1bd40894a3?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>CISA Needs Confirmed Leadership Amid Escalating Cyber Threats</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/goldman-sachs-sounds-alarm-on-anthropics-ai-model-mythos/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1548092372-0d1bd40894a3?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Goldman Sachs Sounds Alarm on Anthropic&apos;s AI Model &apos;Mythos&apos;</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nightclub-giant-rci-hospitality-hit-by-data-breach/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1614064641938-3bbee52942c7?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Nightclub Giant RCI Hospitality Hit by Data Breach</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-4109/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1558459654-c430be5b0a44?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>CVE-2026-4109 — The Eventin – Events Calendar, Event Booking, Ticket &amp;</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-33892/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1596457233038-45a990575b2e?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>CVE-2026-33892: Unauthenticated Remote Access to Siemens Industrial Edge Systems</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-27668/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1548092372-0d1bd40894a3?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>RUGGEDCOM CROSSBOW SAM-P Privilege Escalation Identified</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-25654/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1614064641938-3bbee52942c7?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Siemens SINEC NMS Flaw Allows Arbitrary Password Resets</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-24032/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1550751827-4bd374c3f58b?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Authentication Bypass Hits Siemens SINEC NMS</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/australias-social-media-ban-a-flawed-gamble/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1653387300291-bfa1eeb90e16?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Australia&apos;s Social Media Ban: A Flawed Gamble?</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/kali-forms-rce-wordpress-sites-under-attack/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1526374965328-7f61d4dc18c5?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Kali Forms RCE: WordPress Sites Under Attack</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/fake-claude-ai-installer-delivers-plugx-via-dll-sideloading/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1678811326980-ea1b88cd9e8c?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Fake Claude AI Installer Delivers PlugX via DLL Sideloading</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-2582/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1563206767-5b18f218e8de?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>CVE-2026-2582 — Code Execution</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1542954397-4511/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1583695477819-357b45d15825?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Booking.com Suffers Embarrassing Data Leak</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-3017/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1526374965328-7f61d4dc18c5?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>WordPress PHP Object Injection Hits Smart Post Show Plugin</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/showdoc-rce-flaw-cve-2025-0520-under-active-exploitation/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1550751827-4bd374c3f58b?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>ShowDoc RCE Flaw CVE-2025-0520 Under Active Exploitation</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-4479/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1555949963-ff9fe0c870eb?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>CVE-2026-4479 — Cross-Site Scripting (XSS)</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-4059/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1526374965328-7f61d4dc18c5?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>CVE-2026-4059 — Cross-Site Scripting (XSS)</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-40313/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1558459654-c430be5b0a44?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>PraisonAI GitHub Actions Vulnerable to Critical Token Leak</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-40289/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1510511459019-5dda7724fd87?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>PraisonAI Browser Bridge Critical Session Hijacking</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-40288/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1633265486064-086b219458ec?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>PraisonAI Flaw: Untrusted YAML Leads to RCE</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-40287/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1563206767-5b18f218e8de?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>PraisonAI Flaw: Arbitrary Code Execution via Unsanitized Tool Imports</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-1607/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1633265486064-086b219458ec?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>CVE-2026-1607 — Cross-Site Scripting (XSS)</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6264/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1555949963-ff9fe0c870eb?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Critical RCE in Talend JobServer &amp; Runtime (CVE-2026-6264)</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6227/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1563206767-5b18f218e8de?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>BackWPup Plugin RCE Via Local File Inclusion</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-4388/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1555949963-ff9fe0c870eb?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>WordPress Form Maker Plugin Hit by Stored XSS</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-4365/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1558459654-c430be5b0a44?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Critical WordPress LearnPress Flaw Allows Unauth Data Deletion</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-4352/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1558459654-c430be5b0a44?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>JetEngine Plugin SQLi Puts WordPress Sites at Risk</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-34225/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1596457233038-45a990575b2e?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>CVE-2026-34225 — Server-Side Request Forgery</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-39421/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1558459654-c430be5b0a44?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>CVE-2026-39421 — Code Execution</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-39420/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1550751827-4bd374c3f58b?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>CVE-2026-39420 — Remote Code Execution</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-39418/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1558459654-c430be5b0a44?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>CVE-2026-39418 — MaxKB is an open-source AI assistant for enterprise. In</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-34264/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1558459654-c430be5b0a44?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>CVE-2026-34264 — During authorization checks in SAP Human Capital Management</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-34262/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1550751827-4bd374c3f58b?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>CVE-2026-34262 — Information Disclosure</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-34261/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1563206767-5b18f218e8de?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>CVE-2026-34261 — Due to a missing authorization check in SAP Business</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-34257/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1526374965328-7f61d4dc18c5?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>CVE-2026-34257 — SAP NetWeaver Application Server ABAP, An Unauthenticated At Open Redirect</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-34256/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1596457233038-45a990575b2e?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>SAP ERP/S/4HANA Flaw Exposes ABAP Reports to Unauthorized Overwrites</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-40164/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1563206767-5b18f218e8de?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>jq Hash Collision Vulnerability: CPU Exhaustion via Crafted JSON</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-39417/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1550751827-4bd374c3f58b?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>CVE-2026-39417 — Remote Code Execution</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-34069/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1555949963-ff9fe0c870eb?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>CVE-2026-34069 — nimiq/core-rs-albatross is a Rust implementation of the</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-27683/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1555949963-ff9fe0c870eb?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>CVE-2026-27683 — SAP BusinessObjects Business Intelligence application</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-27681/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1596457233038-45a990575b2e?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Critical SQLi Hits SAP Business Planning &amp; BW</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-27679/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1614064641938-3bbee52942c7?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>CVE-2026-27679 — Due to missing authorization checks in the SAP S/4HANA</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-27678/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1526374965328-7f61d4dc18c5?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>CVE-2026-27678 — Due to missing authorization checks in the SAP S/4HANA</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-27677/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1558459654-c430be5b0a44?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>CVE-2026-27677 — Due to missing authorization checks in the SAP S/4HANA</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-27676/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1550751827-4bd374c3f58b?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>CVE-2026-27676 — Due to missing authorization checks in the SAP S/4HANA</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-27674/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1558459654-c430be5b0a44?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>CVE-2026-27674 — SAP NetWeaver Application Server Java (Web Dynpro Java), An  Vulnerability</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-27673/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1614064641938-3bbee52942c7?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>CVE-2026-27673 — Due to a missing authorization check, SAP S/4HANA (Private</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-27672/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1550751827-4bd374c3f58b?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>CVE-2026-27672 — The Material Master application does not enforce</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-24318/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1596457233038-45a990575b2e?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>CVE-2026-24318 — SAP Business Objects Business Intelligence Platform, An Unau Vulnerability</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-0512/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1614064641938-3bbee52942c7?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>CVE-2026-0512 — The SAP Supplier Relationship Management (SICF Handler In SR Cross-Site Scripting (XSS)</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6203/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1548092372-0d1bd40894a3?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>CVE-2026-6203 — Open Redirect</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-39956/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1596457233038-45a990575b2e?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>CVE-2026-39956 — jq is a command-line JSON processor. In commits after</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6224/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1558459654-c430be5b0a44?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Nocobase Plugin Sandbox Bypass: Remote Exploit Publicly Available</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-40312/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1614064641938-3bbee52942c7?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>CVE-2026-40312 — ImageMagick is free and open-source software used for</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-40311/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1633265486064-086b219458ec?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>CVE-2026-40311 — Use-After-Free</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-40310/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1563206767-5b18f218e8de?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>CVE-2026-40310 — Out-of-Bounds $1</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-40183/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1555949963-ff9fe0c870eb?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>CVE-2026-40183 — ImageMagick is free and open-source software used for</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-40169/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1614064641938-3bbee52942c7?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>CVE-2026-40169 — ImageMagick is free and open-source software used for</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-34238/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1510511459019-5dda7724fd87?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>CVE-2026-34238 — Buffer Overflow</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-33947/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1558459654-c430be5b0a44?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>CVE-2026-33947 — Denial of Service</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-33908/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1526374965328-7f61d4dc18c5?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>ImageMagick DoS: Deep XML Parsing Exhausts Stack</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-33905/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1550751827-4bd374c3f58b?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>CVE-2026-33905 — Out-of-Bounds $1</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-33902/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1614064641938-3bbee52942c7?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>CVE-2026-33902 — ImageMagick&apos;S FX Expression Parser Vulnerability</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-22566/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1550751827-4bd374c3f58b?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>UniFi Play WiFi Credentials Exposed by Access Control Flaw</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-22564/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1596457233038-45a990575b2e?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Critical UniFi Play Flaw: SSH Access Hijack Risk</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-22563/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1614064641938-3bbee52942c7?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>UniFi Play Devices Face Critical Command Injection Vulnerabilities</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-22562/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1633265486064-086b219458ec?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Critical RCE Found in UniFi Play Devices</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/basic-fit-breach-exposes-1-million-members/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1596457233038-45a990575b2e?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Basic-Fit Breach Exposes 1 Million Members</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/ai-the-new-cyber-weapon-for-the-masses/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1614064641938-3bbee52942c7?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>AI: The New Cyber Weapon for the Masses</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6219/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1548092372-0d1bd40894a3?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>CVE-2026-6219 — The Function Child_process.Exec Of The File Src/Compressor.J Command Injection</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6218/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1633265486064-086b219458ec?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>CVE-2026-6218 — Aandrew-Me YtDownloader Vulnerability</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-33901/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1526374965328-7f61d4dc18c5?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>ImageMagick Heap Overflow Vulnerability Exposed</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-33900/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1563206767-5b18f218e8de?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>CVE-2026-33900 — ImageMagick is free and open-source software used for</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-33899/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1510511459019-5dda7724fd87?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>CVE-2026-33899 — ImageMagick is free and open-source software used for</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-33740/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1558459654-c430be5b0a44?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>CVE-2026-33740 — EspoCRM is an open source customer relationship management</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6215/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1510511459019-5dda7724fd87?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>CVE-2026-6215 — Server-Side Request Forgery</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6202/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1563206767-5b18f218e8de?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>CVE-2026-6202 — Code-Projects Easy Blog Site SQL Injection</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6201/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1550751827-4bd374c3f58b?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>CVE-2026-6201 — CodeAstro Online Job Portal Improper Access Control</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-33657/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1555949963-ff9fe0c870eb?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>CVE-2026-33657 — EspoCRM is an open source customer relationship management</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-33534/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1614064641938-3bbee52942c7?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>CVE-2026-33534 — Server-Side Request Forgery</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-32605/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1548092372-0d1bd40894a3?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Nimiq Albatross Vulnerability: Validator Crash via Malformed Proposal</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1373735086-4978/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1680992044138-ce4864c2b962?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>New Threat Actor &apos;Lamashtu&apos; Emerges on the Cyber Scene</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1373735086-4977/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1582266255765-fa5cf1a1d501?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>High-Value E-commerce Source Code and Database Advertised</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6200/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1550751827-4bd374c3f58b?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Tenda F456 Router Faces High-Severity Stack Buffer Overflow</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6199/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1563206767-5b18f218e8de?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Tenda F456 Router Hit by Critical Stack-Based Buffer Overflow</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6198/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1558459654-c430be5b0a44?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Tenda F456 Routers Hit by Critical Buffer Overflow</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6197/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1526374965328-7f61d4dc18c5?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Tenda Router Vulnerability Exposes Networks to Remote Attacks</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-40044/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1555949963-ff9fe0c870eb?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Pachno Framework Critical Deserialization Flaw Allows RCE</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-40043/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1550751827-4bd374c3f58b?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>CVE-2026-40043 — The RunSwitchUser() Action That Authentication Bypass</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-40042/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1633265486064-086b219458ec?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Pachno Suffers Critical XML Injection Vulnerability (CVE-2026-40042)</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-40041/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1558459654-c430be5b0a44?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>CVE-2026-40041 — Pachno 1.0.6 contains a cross-site request forgery</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-40040/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1526374965328-7f61d4dc18c5?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Pachno RCE: Unrestricted File Upload Bypasses Filters</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-40039/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1548092372-0d1bd40894a3?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>CVE-2026-40039 — Open Redirect</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-40038/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1563206767-5b18f218e8de?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Pachno 1.0.6 Plagued by Stored XSS</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248710/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1519575706483-221027bfbb31?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>FBI Nabs W3LL Phishing Dev, Dismantles Infrastructure</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248709/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1633265486064-086b219458ec?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>CISA Adds Seven New KEVs to Catalog, Mandates Federal Action</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6196/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1596457233038-45a990575b2e?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Tenda F456 Routers Hit by Critical Remote Buffer Overflow</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6195/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1614064641938-3bbee52942c7?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Critical RCE Hits Totolink Routers: Patch Your A7100RU Now</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6194/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1614064641938-3bbee52942c7?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Totolink A3002MU B20211125.1046 Router Faces High-Severity RCE</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-32316/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1510511459019-5dda7724fd87?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>jq Integer Overflow: Heap Buffer Overflow Risks Untrusted Queries</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-28291/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1558459654-c430be5b0a44?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Git Option Manipulation Flaw Bypasses Safety Checks</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2025-3756/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1614064641938-3bbee52942c7?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>CVE-2025-3756 — AC800M (System 800xA): From 6.0.0x Vulnerability</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1542954397-4510/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1753998941540-081eed4f6397?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>New GitHub Project &apos;WeClone&apos; Builds Digital Twins from Chats</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248708/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1642133516482-e99ea85011b3?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>OpenAI Rotates macOS Certs After Supply Chain Attack on Axios Package</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6193/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1596457233038-45a990575b2e?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>PHPGurukul Daily Expense System Hit by SQLi Vulnerability</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6191/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1555949963-ff9fe0c870eb?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>CVE-2026-6191 — An Unknown Function Of The File /Equipments.Php SQL Injection</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6190/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1526374965328-7f61d4dc18c5?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>CVE-2026-6190 — Itsourcecode Construction Management System SQL Injection</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6189/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1633265486064-086b219458ec?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>SQL Injection Found in Pharmacy Sales and Inventory System</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-33555/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1596457233038-45a990575b2e?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>CVE-2026-33555 — HAProxy Vulnerability</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6231/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1526374965328-7f61d4dc18c5?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>CVE-2026-6231 — Applications That Rely On These Functions To Validate Untrus Vulnerability</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6188/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1596457233038-45a990575b2e?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>SQL Injection Flaw Found in Pharmacy System: Exploit Available</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6187/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1596457233038-45a990575b2e?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>SQLi Exploit Public for SourceCodester Pharmacy System</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6186/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1563206767-5b18f218e8de?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>UTT HiPER 1200GW Buffer Overflow: Remote Exploit Publicly Available</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2025-31991/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1633265486064-086b219458ec?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>CVE-2025-31991 — Rate Limiting for attempting a user login is not being</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1233397458-73858/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1548092372-0d1bd40894a3?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Cisco Firewall Roadmap for Post-Quantum Cryptography</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248703/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1550751827-4bd374c3f58b?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>AI Agent Risk Uncovered: Qualys ETM Connects OpenClaw Dots</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248701/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1510511459019-5dda7724fd87?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>APT41 Leverages New Stealthy Cloud Credential Harvester</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1373735086-4976/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1770159116807-9b2a7bb82294?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Ransomware Landscape: US Dominates Targets, Healthcare Most Hit</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248700/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1582266255765-fa5cf1a1d501?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>W3LL Phishing Network Crushed by FBI and Indonesian Police</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1707304340-2267/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1550751827-4bd374c3f58b?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>WhatsApp vs. Telegram: Encryption Backdoor Allegations Erupt</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6183/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1526374965328-7f61d4dc18c5?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>SQLi Exploit Drops for Simple CMS 1.0</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6182/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1548092372-0d1bd40894a3?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>SQL Injection Found in Simple CMS: Public Exploit Available</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-1462/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1558459654-c430be5b0a44?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Keras Vulnerability Lets Attackers Execute Code Via SavedModels</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248699/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1542831371-29b0f74f9713?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Gujarat Police Bust Rs 77 Cr Cyber Fraud Ring with International Ties</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248697/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1633265486064-086b219458ec?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Fiber Optic Spying, Windows Rootkits, and AI Bugs: The Weekly Cyber Rundown</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248696/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1653387137517-fbc54d488ed8?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>LinkedIn &apos;Spying&apos; Claims Fizzle Amid Security Research</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248695/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1510511459019-5dda7724fd87?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>New &apos;Storm&apos; Infostealer Bypasses Endpoint Detection via Server-Side Decryption</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248694/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1608742213509-815b97c30b36?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Mule Account Bust in Multi-State Cyber Fraud Under Operation MATRIX</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1955946092-641/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1558459654-c430be5b0a44?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>OSINT Industries Launches New Geolocation CTF Challenge</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248693/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1680992045535-95919d4971a9?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>LAPD Data Breach Exposes 7.7 TB from City Attorney&apos;s Office</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1233397458-73857/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1548092372-0d1bd40894a3?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Smart Sex Toys: More Than Just Fun, They&apos;re Data Goldmines</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1427288221-8762/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1680992045563-2ab442f3feee?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Ransomware Rumble: 0APT Claims Krybit Ransomware Group as Victim</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1233397458-73856/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1542903660-eedba2cda473?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Zimbabwe Battles AI-Powered Cyber Fraud Surge</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1233397458-73855/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1590971862391-06cac0657603?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Signal Messages Recovered Post-Uninstall on iPhones</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248690/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1550751827-4bd374c3f58b?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>North Korea-Linked Hackers Hit OpenAI Via Supply Chain</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248688/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1550751827-4bd374c3f58b?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Adobe Reader Zero-Day Exploited in the Wild: Patch Urgently</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1542954397-4508/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1653387137517-fbc54d488ed8?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Elon Musk&apos;s XChat: Privacy Theater or Genuine Innovation?</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/cisa-kev-CVE-2026-21643/</loc>
    <image:image>
      <image:loc>https://shimiscyberworld.com/assets/images/covers/vulnerability.svg</image:loc>
      <image:title>CVE-2026-21643 — Fortinet FortiClient EMS: Fortinet SQL Injection Vulnerability</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/cisa-kev-CVE-2025-60710/</loc>
    <image:image>
      <image:loc>https://shimiscyberworld.com/assets/images/covers/vulnerability.svg</image:loc>
      <image:title>CVE-2025-60710 — Microsoft Windows: Microsoft Windows Link Following Vulnerability</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/cisa-kev-CVE-2023-36424/</loc>
    <image:image>
      <image:loc>https://shimiscyberworld.com/assets/images/covers/vulnerability.svg</image:loc>
      <image:title>CVE-2023-36424 — Microsoft Windows: Microsoft Windows Out-of-Bounds Read Vulnerability</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/cisa-kev-CVE-2023-21529/</loc>
    <image:image>
      <image:loc>https://shimiscyberworld.com/assets/images/covers/vulnerability.svg</image:loc>
      <image:title>CVE-2023-21529 — Microsoft Exchange Server: Microsoft Exchange Server Deserialization of Untrusted Data Vulnerability</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/cisa-kev-CVE-2020-9715/</loc>
    <image:image>
      <image:loc>https://shimiscyberworld.com/assets/images/covers/vulnerability.svg</image:loc>
      <image:title>CVE-2020-9715 — Adobe Acrobat: Adobe Acrobat Use-After-Free Vulnerability</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/cisa-kev-CVE-2012-1854/</loc>
    <image:image>
      <image:loc>https://shimiscyberworld.com/assets/images/covers/vulnerability.svg</image:loc>
      <image:title>CVE-2012-1854 — Microsoft Visual Basic for Applications (VBA): Microsoft Visual Basic for Applications Insecure Library Loading Vulnerability</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248686/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1753998941540-081eed4f6397?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Global Takedown Crushes Multimillion-Dollar Crypto Scams</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1427288221-8761/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1563206767-5b18f218e8de?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Tax Authority Phishing: Don&apos;t Fall for Compensation Scams</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1427288221-8760/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1592609930961-219235eded71?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Phony Cloud Storage Warnings: A Clickbait Trap</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248685/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1510511459019-5dda7724fd87?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Booking.com Breach: Customer Data Exposed, Cyber Threat Intelligence Reports</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248684/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1550751827-4bd374c3f58b?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Webloc Surveillance Tool Tracks 500 Million Devices for Law Enforcement</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248683/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1620825937374-87fc7d6bddc2?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Trusted Software Compromised: CPU-Z and HWMonitor Downloads Trojanized</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248680/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1563206767-5b18f218e8de?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Fake Claude AI Site Drops PlugX RAT</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248679/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1666615435088-4865bf5ed3fd?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Handala Claims Breaches at Major UAE Organizations</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1233397458-73850/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1519575706483-221027bfbb31?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>W3LL Phishing Empire Dismantled by International Law Enforcement</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248676/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1592609930961-219235eded71?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>JanelaRAT Targets Latin American Financial Sector</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248675/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1487058792275-0ad4aaf24ca7?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Gmail Beefs Up Enterprise Encryption on Mobile</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1233397458-73849/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1582266255765-fa5cf1a1d501?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Ransomware Hits Dutch Software Vendor, Disrupts Hospitals</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1233397458-73848/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1770159116807-9b2a7bb82294?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Rockstar Games Confirms Breach, ShinyHunters Claims Credit</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1597138777-3457/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1580596347022-d0193a6e1d82?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Telegram OSINT: A New Toolkit for Cyber Sleuths</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248673/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1582266255765-fa5cf1a1d501?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>CPUID Watering Hole Attack Spreads STX RAT via Fake Downloads</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248671/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1504639725590-34d0984388bd?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Cyber Threat Intelligence&apos;s Weekly Roundup: April 6-12</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6168/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1633265486064-086b219458ec?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>TOTOLINK A7000R Stack Buffer Overflow: Remote Exploit Published</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6167/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1614064641938-3bbee52942c7?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>SQLi Flaw Hits Faculty Management System: Exploit Public</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6166/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1548092372-0d1bd40894a3?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>SQLi Flaw Hits Vehicle Showroom Management System</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-5936/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1550751827-4bd374c3f58b?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>CVE-2026-5936: High-Severity SSRF Poses Internal Network Threat</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-40436/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1596457233038-45a990575b2e?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>CVE-2026-40436 — The ZTE ZXEDM iEMS product has a password reset</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-34866/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1550751827-4bd374c3f58b?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>CVE-2026-34866 — Out-of-Bounds $1</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1233397458-73847/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1548092372-0d1bd40894a3?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>OpenAI Responds to Axios npm Attack, Rotates macOS Certs</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6165/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1558459654-c430be5b0a44?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>CVE-2026-6165 — Unknown Code Of The File /Util/Login_check.Php SQL Injection</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6164/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1596457233038-45a990575b2e?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>CVE-2026-6164 — Code-Projects Lost And Found Thing Management SQL Injection</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6163/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1563206767-5b18f218e8de?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>SQLi Found in Lost and Found Thing Management</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-40447/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1558459654-c430be5b0a44?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>CVE-2026-40447 — Samsung Open Source Escargot Integer Overflow</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-21010/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1558459654-c430be5b0a44?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>CVE-2026-21010 — Improper input validation in Retail Mode prior to SMR</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248670/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1771061863061-8ffdddb28098?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>AI Security Rises as CIOs Rank It with Top Cyber Risks</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1542954397-4507/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1753998941540-081eed4f6397?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Meta Insider Lifts 30K Private Facebook Photos</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248669/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1610878785620-3ab2d3a2ae7b?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>MITRE F3 Unites Fraud &amp; Cyber Teams Against Financial Crime</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6161/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1563206767-5b18f218e8de?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>CVE-2026-6161: Simple ChatBox SQLi — High Severity, Public Exploit</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6158/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1633265486064-086b219458ec?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Totolink N300RH Router Hit by Remote Command Injection</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-40446/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1526374965328-7f61d4dc18c5?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>CVE-2026-40446 — Samsung Open Source Escargot Vulnerability</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-35553/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1596457233038-45a990575b2e?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>CVE-2026-35553 — Buffer Overflow</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-34864/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1550751827-4bd374c3f58b?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>CVE-2026-34864 — Boundary-unlimited vulnerability in the application read</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-34863/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1614064641938-3bbee52942c7?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>CVE-2026-34863 — Out-of-Bounds $1</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-34862/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1510511459019-5dda7724fd87?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>CVE-2026-34862 — Race Condition</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-34861/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1550751827-4bd374c3f58b?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>CVE-2026-34861 — Race Condition</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-34859/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1555949963-ff9fe0c870eb?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>CVE-2026-34859 — UAF vulnerability in the kernel module. Impact: Successful</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-34854/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1596457233038-45a990575b2e?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>CVE-2026-34854 — UAF vulnerability in the kernel module. Impact: Successful</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-25209/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1614064641938-3bbee52942c7?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>CVE-2026-25209 — Samsung Open Source Escargot Out-of-Bounds $1</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-25208/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1526374965328-7f61d4dc18c5?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>High-Severity Integer Overflow in Samsung Escargot Poses Risk</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-25207/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1558459654-c430be5b0a44?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>CVE-2026-25207 — Samsung Open Source Escargot Out-of-Bounds $1</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-25206/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1596457233038-45a990575b2e?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>CVE-2026-25206 — Samsung Open Source Escargot Out-of-Bounds $1</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-25205/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1550751827-4bd374c3f58b?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Samsung Escargot Heap Overflow: A Ticking Time Bomb</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6157/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1550751827-4bd374c3f58b?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Totolink A800R Routers Hit by Remote Buffer Overflow</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6156/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1614064641938-3bbee52942c7?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Critical RCE Hits Totolink Routers: CVE-2026-6156 Explained</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6155/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1563206767-5b18f218e8de?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Critical RCE Found in Totolink A7100RU Routers</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6154/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1526374965328-7f61d4dc18c5?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Critical RCE Flaw in Totolink A7100RU Routers Exposed</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6153/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1596457233038-45a990575b2e?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>SQLi Found in Vehicle Showroom Management System</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-34867/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1510511459019-5dda7724fd87?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>CVE-2026-34867 — Double free vulnerability in the multi-mode input system.</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-34860/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1550751827-4bd374c3f58b?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>CVE-2026-34860 — Access control vulnerability in the memo module. Impact:</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-34856/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1548092372-0d1bd40894a3?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>UAF Flaw Hits Communication Module, Poses High Availability Risk</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-34853/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1548092372-0d1bd40894a3?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>High-Severity Permission Bypass Hits LBS Module</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-34852/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1563206767-5b18f218e8de?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>CVE-2026-34852 — Stack overflow vulnerability in the media platform. Impact:</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-28553/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1614064641938-3bbee52942c7?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>CVE-2026-28553 — Vulnerability of improper permission control in the theme</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248668/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1680992046617-e2e35451bcdb?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Cyber Threat Intelligence: Beyond the Noise</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6152/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1555949963-ff9fe0c870eb?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>CVE-2026-6152: SQLi Hits Vehicle Showroom Management System</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6151/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1614064641938-3bbee52942c7?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>SQLi Found in Vehicle Showroom System (CVE-2026-6151)</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6150/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1614064641938-3bbee52942c7?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>CVE-2026-6150 — Code-Projects Simple Laundry System Vulnerability</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6149/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1563206767-5b18f218e8de?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>CVE-2026-6149 — Code-Projects Vehicle Showroom Management System SQL Injection</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6148/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1550751827-4bd374c3f58b?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>CVE-2026-6148: SQLi Hits Vehicle Showroom Management System</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6143/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1633265486064-086b219458ec?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>CVE-2026-6143 — Farion1231 Cc-Switch Vulnerability</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6142/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1555949963-ff9fe0c870eb?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>SQL Injection Found in Hotel Management System</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6141/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1633265486064-086b219458ec?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>CVE-2026-6141 — Command Injection</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6140/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1555949963-ff9fe0c870eb?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Critical RCE Found in Totolink A7100RU Routers</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6139/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1548092372-0d1bd40894a3?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Critical RCE Found in Totolink A7100RU Routers</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-25204/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1614064641938-3bbee52942c7?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>CVE-2026-25204 — Samsung Open Source Escarogt Java Script Denial of Service</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6138/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1614064641938-3bbee52942c7?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Totolink A7100RU Routers Hit by Critical OS Command Injection</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6137/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1596457233038-45a990575b2e?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Tenda F451 Router Stack Overflow: Public Exploit Available</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6136/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1633265486064-086b219458ec?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>High-Severity Buffer Overflow Hits Tenda F451 Routers</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6135/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1548092372-0d1bd40894a3?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Tenda F451 Router Hit by Remote Stack Buffer Overflow</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6134/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1550751827-4bd374c3f58b?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Tenda F451 Router Hit by Remote Buffer Overflow</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6133/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1526374965328-7f61d4dc18c5?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Tenda Router Faces Critical Stack Buffer Overflow</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6132/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1563206767-5b18f218e8de?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Critical RCE Found in Totolink A7100RU Routers</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6131/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1548092372-0d1bd40894a3?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Critical RCE Flaw Hits Totolink Routers</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6130/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1563206767-5b18f218e8de?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>New Chatbox AI Flaw: Remote OS Command Injection</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6129/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1550751827-4bd374c3f58b?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>ChatGPT-on-WeChat Agent Mode Vulnerability Exposes Users</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-40396/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1614064641938-3bbee52942c7?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>CVE-2026-40396 — Denial of Service</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-40395/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1614064641938-3bbee52942c7?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>CVE-2026-40395 — Denial of Service</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-40394/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1510511459019-5dda7724fd87?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>CVE-2026-40394 — Denial of Service</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/daily-digest/</loc>
    <image:image>
      <image:loc>https://shimiscyberworld.com/assets/images/covers/threat-intel.svg</image:loc>
      <image:title>Daily Security Digest — 2026-04-12</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-40393/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1614064641938-3bbee52942c7?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Mesa WebGPU Bug Allows Out-of-Bounds Memory Access</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-40386/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1555949963-ff9fe0c870eb?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>CVE-2026-40386 — In libexif through 0.6.25, an integer underflow in size</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-40385/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1633265486064-086b219458ec?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>CVE-2026-40385 — Integer Overflow</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248664/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1504639725590-34d0984388bd?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Narela Cyber Fraud Ring Busted, Crypto Links Uncovered</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1427288221-8758/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1579397256979-cc326aefe273?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Iranian Group Ababil of Minab Hits US GPS Provider Vyncs</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248662/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1550751827-4bd374c3f58b?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Marimo Vulnerability Under Active Exploit for Credential Theft</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248661/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1542903660-eedba2cda473?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Hackers Claim Control Over Venice Anti-Flood System</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2019-25709/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1614064641938-3bbee52942c7?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>CVE-2019-25709 — CF Image Hosting Script 1.6.5 allows unauthenticated</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2019-25705/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1558459654-c430be5b0a44?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>CVE-2019-25705 — Buffer Overflow</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2019-25701/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1596457233038-45a990575b2e?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>CVE-2019-25701: Easy Video to iPod Converter Buffer Overflow</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2019-25697/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1526374965328-7f61d4dc18c5?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Unauthenticated SQLi Threatens CMSsite 1.0</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2019-25695/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1563206767-5b18f218e8de?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>R 3.4.4 Local Buffer Overflow: Arbitrary Code Execution via GUI</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2019-25691/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1596457233038-45a990575b2e?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Faleemi Desktop Software CVE-2019-25691: Buffer Overflow Bypasses DEP</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2019-25689/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1555949963-ff9fe0c870eb?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>CVE-2019-25689 — Code Execution</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2018-25258/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1563206767-5b18f218e8de?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>CVE-2018-25258 — The GUI Preferences Dialog That Code Execution</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248660/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1770159116807-9b2a7bb82294?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Malware Roundup: Iranian APTs, Zero-Days, and Developer Tool Exploits</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1427288221-8754/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1558459654-c430be5b0a44?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>International Identity Management Day: A Critical Look at Identity Theft</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1707304340-2265/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1550751827-4bd374c3f58b?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Tax Authority Phishing Scams Target Compensation Claims</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248659/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1542903660-eedba2cda473?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Delhi Police Disrupt Interstate Cyber Fraud Ring, Five Arrested</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248658/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1542903660-eedba2cda473?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Bank Employee Busted in Delhi Cyber Fraud Scheme</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1597138777-3456/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1633265486064-086b219458ec?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Stalkie: OSINT Tool for Social Media Account Discovery</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6124/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1558459654-c430be5b0a44?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>CVE-2026-6124 — The Function FromSafeMacFilter Of The File /Goform/SafeMacFi Buffer Overflow</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6123/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1548092372-0d1bd40894a3?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Tenda F451 Router Hit by Remote Buffer Overflow</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248657/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1653387300291-bfa1eeb90e16?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Weekly Threat Roundup: APTs, Zero-Days, and IoT Botnets</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1373735086-4975/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1680992046615-065f58bcb4d8?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>BLACKWATER: New Threat Actor Emerges on the Cyber Landscape</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6122/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1555949963-ff9fe0c870eb?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Tenda F451 Router Hit with High-Severity Buffer Overflow</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6121/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1550751827-4bd374c3f58b?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Tenda F451 Router Hit with Critical Buffer Overflow</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1233397458-73842/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1760199789455-49098afd02f0?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Iranian APTs Target Exposed Rockwell PLCs: 5,219 Devices at Risk</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1129491012-158939/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1596457233038-45a990575b2e?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Linux Kernel BPF Bug Forks Verifier, Allows OOB Map Access</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6120/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1555949963-ff9fe0c870eb?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Tenda F451 Router Hit by Remote Buffer Overflow</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6119/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1548092372-0d1bd40894a3?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>CVE-2026-6119 — A vulnerability was identified in AstrBotDevs AstrBot up to</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248654/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1614064641938-3bbee52942c7?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Adobe Patches Actively Exploited Acrobat Reader Flaw</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6116/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1550751827-4bd374c3f58b?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>CVE-2026-6116 — Totolink A7100RU 7.4cu.2313_b20191024 Command Injection</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6115/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1550751827-4bd374c3f58b?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>CVE-2026-6115 — Totolink A7100RU 7.4cu.2313_b20191024 Command Injection</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1542954397-4505/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1583695477819-357b45d15825?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>PS5 Scam: When Digital Dreams Meet Paper Reality</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1390175645-418/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1614064641938-3bbee52942c7?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Hallmark Suffers Alleged Breach, 1.7M Accounts Exposed</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1500098925-274/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1563206767-5b18f218e8de?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Google Link: A Red Herring in Cyber Intel?</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248653/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1487058792275-0ad4aaf24ca7?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Awareness: The Only Real Shield Against Cyber Fraud</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248652/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1510511459019-5dda7724fd87?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Iranian APTs Target Exposed Industrial Control Systems</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1427288221-8751/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1542903660-eedba2cda473?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>ShinyHunters Claims Rockstar Games Breach via Snowflake Supply Chain</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1233397458-73841/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1620825937374-87fc7d6bddc2?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>GlassWorm Evolves, Leverages Zig Dropper for Developer Tool Infiltration</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1707304340-2263/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1771061863061-8ffdddb28098?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Cyber Saturday Rundown: Data Leaks, Critical Patches, and Geopolitical Tensions</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248650/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1765299856473-abaac2f1aa70?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>GlassWorm Leverages Zig Dropper, Marimo RCE Exploited</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1542954397-4503/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1590971862391-06cac0657603?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Satoshi Hunt Continues: NYT Points to Adam Back</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1373735086-4974/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1618060932014-4deda4932554?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Sensitive Data Breach Hits Israeli Children&apos;s Platform</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1373735086-4973/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1695668548342-c0c1ad479aee?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Italian Airport Access Up for Grabs on Darknet</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1955946092-640/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1642133516482-e99ea85011b3?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>OSINT&apos;s Peril: The Cost of Rushed Identification</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248649/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1680992046626-418f7e910589?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Resecurity Nabs Cyber 150 Spot for Full-Spectrum Threat Intel</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248648/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1653387137517-fbc54d488ed8?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Operation Atlantic Nabs 20,000 Crypto Fraud Victims, $12M Frozen</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248645/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1590971862391-06cac0657603?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>AI &amp; Crypto Scams Bleed Billions from Americans</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1129491012-158905/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1596457233038-45a990575b2e?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Linux Kernel Patch Plugs Resource Leak in Block Subsystem</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248644/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1653387300291-bfa1eeb90e16?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Delhi Police Busts Digital Arrest, Investment Fraud Ring</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248643/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1504639725590-34d0984388bd?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>IPS Officer&apos;s Film &apos;Khauf&apos; Battles Cyber Fraud</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1597138777-3455/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1590971862391-06cac0657603?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>OSINTCon 2026: Open-Source Intel Conference Returns</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1233397458-73839/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1592609930961-219235eded71?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>US Commerce Dept Forges New AI Export Regime</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1233397458-73838/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1596457233038-45a990575b2e?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>AirSnitch: Guest Network Isolation is a Myth</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248640/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1550751827-4bd374c3f58b?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Marimo RCE: 10 Hours From Disclosure to Exploitation</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1129491012-158894/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1633265486064-086b219458ec?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>xdg-dbus-proxy Flaw Bypasses Eavesdrop Restrictions</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1129491012-158889/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1510511459019-5dda7724fd87?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>UsersWP Plugin SSRF Vulnerability Exposes WordPress Sites</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248638/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/linkedin/telegram-1323386230-248638.png</image:loc>
      <image:title>ChatGPT Pro: OpenAI Targets Coders, Enterprises with New $100 Tier</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248637/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1666615435088-4865bf5ed3fd?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>AI Fuels Next-Gen Device Code Phishing Escalation</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1129491012-158872/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1558459654-c430be5b0a44?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>CVE-2026-35534 — ChurchCRM is an open-source church management system. Prior to 7.1.0, a stored…</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1129491012-158860/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1596457233038-45a990575b2e?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>CVE-2026-23555 — Any guest issuing a Xenstore command accessing a node using the</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1129491012-158858/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1526374965328-7f61d4dc18c5?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>CVE-2026-33186 — gRPC-Go is the Go language implementation of gRPC. Versions prior to 1.79.3…</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248634/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1678811326980-ea1b88cd9e8c?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Hims Breach: PHI Exposed, Privacy Shattered</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1129491012-158855/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1548092372-0d1bd40894a3?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>CVE-2026-40175 — Axios is a promise based HTTP client for the browser and Node.js. Prior to…</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1129491012-158854/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1555949963-ff9fe0c870eb?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>CVE-2026-40168 — Postiz is an AI social media scheduling tool. Prior to 2.21.5, the…</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1129491012-158853/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1614064641938-3bbee52942c7?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>CVE-2026-39922 — GeoNode versions 4.0 before 4.4.5 and 5.0 before 5.0.2 contain a server-side…</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1129491012-158851/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1614064641938-3bbee52942c7?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>CVE-2026-32252 — Chartbrew is an open-source web application that can connect directly to…</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1129491012-158845/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1633265486064-086b219458ec?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>AWS Research and Engineering Studio Flaw Allows Privilege Escalation</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1129491012-158840/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1555949963-ff9fe0c870eb?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>CVE-2026-39349 — OrangeHRM is a comprehensive human resource management (HRM) system. From 5.0…</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248632/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1614064548237-096f735f344f?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>US Commerce Dept. Promotes &apos;American AI&apos; Exports Globally</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248631/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1760199789463-b523db55dd8b?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Breaches Increasingly Blend with Normal Business Operations</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1129491012-158832/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1510511459019-5dda7724fd87?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Genealogy App Suffers Critical Access Control Flaw</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1129491012-158830/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1633265486064-086b219458ec?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Tandoor Recipes Flaw Exposes Private Recipes</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1129491012-158829/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1614064641938-3bbee52942c7?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>BentoML Vulnerability Allows Host Code Execution via Malicious Archives</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248630/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1519575706483-221027bfbb31?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Alamo Heights ISD Stays Silent on Ransom Payment Post-Malware Attack</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1233397458-73837/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1550751827-4bd374c3f58b?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>AI Reshaping Bug Bounty Hunting: Pentesting News Insights</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248629/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1653387300291-bfa1eeb90e16?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Big Tech Data Handed to US Authorities, Affecting Millions</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248628/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1597733336794-12d05021d510?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Kanpur Police Dismantle &apos;Mini Jamtara&apos; Cyber Fraud Ring</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1129491012-158810/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1633265486064-086b219458ec?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Storybook Vulnerability Exposes Sensitive Environment Variables</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248626/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1642783327704-2500e96fe3d9?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Fake Claude Site Delivers PlugX Malware via Trojanized App</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248625/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1558459654-c430be5b0a44?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Patch Window Shrinking: Exploits Accelerate</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1955946092-637/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1563206767-5b18f218e8de?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Police Detail Real CSAM Investigations at OSINT Connect</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248623/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1542903660-eedba2cda473?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>FINRA&apos;s New Fusion Center Targets Financial Cybercrime and Fraud</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1129491012-158805/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1550751827-4bd374c3f58b?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>iCalendar Library Vulnerability: ICS Injection Flaw Uncovered</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248621/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1548092372-0d1bd40894a3?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Orange Business Boosts Enterprise Voice with AI and Security Upgrades</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1129491012-158803/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1526374965328-7f61d4dc18c5?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>pyLoad Vulnerability Lets Low-Privilege Users Hijack Downloads</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1129491012-158799/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1558459654-c430be5b0a44?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>OpenHands AI Dev Tool Hit with Command Injection Flaw</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248620/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1642133516482-e99ea85011b3?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>ClickFix Malware Bypasses macOS Security via Script Editor</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248619/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1760199789455-49098afd02f0?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Ransomware Attack Cripples Dutch Firm ChipSoft, Disrupting Hospital Services</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1129491012-158798/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1510511459019-5dda7724fd87?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>GlobaLeaks Whistleblower Tool Leaks Sensitive Support Emails</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1129491012-158796/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1633265486064-086b219458ec?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>AFFiNE Vulnerability: Open Redirect Flaw Patched in v0.26.0</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1129491012-158793/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1555949963-ff9fe0c870eb?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Metabase Subscription Vulnerability Exposes Self-Hosted Instances</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248618/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1555949963-ff9fe0c870eb?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Stryker Hit, Windows Zero-Day, China Supercomputer Targeted</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248616/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1653387137517-fbc54d488ed8?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Bombay HC Orders HDFC Bank to Refund Rs 38 Lakh in Cyber Fraud Case</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248615/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1519575706483-221027bfbb31?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>AI Security Now a Top CIO Concern, Rivals Malware and Ransomware</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1129491012-158791/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1526374965328-7f61d4dc18c5?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>ChurchCRM Flaw Exposes Users to Cross-Site Scripting Attacks</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1373735086-4971/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1614064641938-3bbee52942c7?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Top Ransomware Crews Dominating the 2026 Attack Landscape</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248612/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1542903660-eedba2cda473?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Human-Scale Security Broken: 1 Billion Records Reveal Exploit Before Patch</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248611/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1592609930961-219235eded71?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Zephyr Energy Loses $1M in Sophisticated Payment Redirection Scam</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248610/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1526374965328-7f61d4dc18c5?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Juniper Patches Critical Junos OS Vulnerabilities</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248609/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1548092372-0d1bd40894a3?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Industrial Control Systems Remain Prime Cyber Conflict Targets</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248608/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1758773263238-1989d0cc788c?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>CPUID Hit by Supply Chain Attack, Malware Disguised as System Tools</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248607/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1550751827-4bd374c3f58b?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Anthropic&apos;s AI: Can it be kept from bad actors?</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248606/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1487058792275-0ad4aaf24ca7?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Iran&apos;s ICS Hacking: Industry Weighs In on Critical Infrastructure Threats</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248605/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1597733336794-12d05021d510?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Delhi Police Busts Fake Overseas Job &amp; Visa Cyber Fraud Ring</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248604/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1579397256979-cc326aefe273?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Payroll Pirates Target Canadian Employees via Microsoft 365 Hijacking</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248603/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1579397256979-cc326aefe273?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Orthanc DICOM Flaws Expose Medical Systems to Crashes and RCE</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1427288221-8745/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1632910138458-5bf601f3835e?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>AI Rapidly Generates Exploits, Shifting Vulnerability Prioritization</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248602/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1653387300291-bfa1eeb90e16?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>LucidRook Malware Targets Taiwan Institutions Via UAT-10362</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248601/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1597733336794-12d05021d510?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>CBI Charges Siliguri Man in Massive ₹23 Crore &apos;Digital Arrest&apos; Cyber Fraud</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248599/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1548092372-0d1bd40894a3?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Chrome 147 Fixes 60 Vulnerabilities, Two Critical Flaws</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248598/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1614064548237-096f735f344f?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Gmail E2EE Now Native on Mobile for Enterprise Users</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1597138777-3454/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1451187580459-43490279c0fa?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Unpacking Threads: OSINT Techniques Revealed</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248596/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1590971862391-06cac0657603?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Delhi Police Smash International Cyber Fraud Ring Using SIM Boxes</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1129491012-158764/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1555949963-ff9fe0c870eb?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Synology VPN Client Flaw Exposes User PINs</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248595/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1633265486064-086b219458ec?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>MITRE Releases Fight Fraud Framework</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1233397458-73831/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1487058792275-0ad4aaf24ca7?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Gulf&apos;s Critical Infrastructure Faces Escalating Cybersecurity Threats Amidst Iran Tensions</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1233397458-73830/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1583695477819-357b45d15825?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Microsoft Recall Vulnerability Exposes Sensitive User Data</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1233397458-73829/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1695668548342-c0c1ad479aee?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Bitcoin Depot Loses $3.6M in Bitcoin via Stolen Credentials</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248594/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1633265486064-086b219458ec?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Marimo Vulnerability Exploited Rapidly Post-Disclosure</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248592/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1550751827-4bd374c3f58b?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>EngageLab SDK Bug Exposes 50M Android Users&apos; Private Data</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1129491012-158757/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1526374965328-7f61d4dc18c5?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>OpenStack Skyline Vulnerable to DOM-Based XSS</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1129491012-158756/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1633265486064-086b219458ec?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>CVE-2026-22750 — When configuring SSL bundles in Spring Cloud Gateway by using the configuration…</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1233397458-73828/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1550751827-4bd374c3f58b?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>FCC Tightens KYC Rules to Combat Illegal Robocalls</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248589/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1632910138458-5bf601f3835e?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Chrome Gets New Defenses Against Cookie Theft Attacks</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248588/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1526374965328-7f61d4dc18c5?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Microsoft Discovers Android Crypto Wallet Flaw Affecting Millions</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1542954397-4500/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1550751827-4bd374c3f58b?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>FBI Recovers Deleted Signal Messages from iPhone Notifications</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1233397458-73824/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1550751827-4bd374c3f58b?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>GitLab Patches High-Severity Flaw Alongside 11 Other Vulnerabilities</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1233397458-73823/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1579397256979-cc326aefe273?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>US Treasury Launches Crypto Cybersecurity Initiative Amidst Rising Attacks</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1233397458-73818/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1682559736721-c2e77ff4c650?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Google&apos;s New Cookie Defense: Device-Bound Session Credentials</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248587/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1642783327704-2500e96fe3d9?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Backdoored Smart Slider 3 Pro Update Hits WordPress Sites</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248586/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/linkedin/telegram-1323386230-248586.png</image:loc>
      <image:title>US Public Sector Faces Escalating Cyber Threats in Early 2026</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248584/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/linkedin/telegram-1323386230-248584.png</image:loc>
      <image:title>US Treasury to Share Cyber Intel Directly with Crypto Firms</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1707304340-2260/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1767817099805-d79e31fb968c?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Belgian Municipality Crippled by Cyberattack, Services Offline</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1542954397-4499/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1592609930961-219235eded71?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Telegram CEO Fires Salvo at WhatsApp Encryption Claims</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248581/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/linkedin/telegram-1323386230-248581.png</image:loc>
      <image:title>India Joins Forces to Combat Cyber Fraud and Financial Crime</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1129491012-158728/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1555949963-ff9fe0c870eb?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>WP-Optimize Vulnerability Lets Low-Privilege Users Wreck Smush Features</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1129491012-158721/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1550751827-4bd374c3f58b?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Sulu CMS Flaw Grants Unauthorized Admin API Access</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1129491012-158720/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1563206767-5b18f218e8de?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Discourse Flaw Exposes Private Content to Moderators</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1129491012-158717/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/linkedin/telegram-1129491012-158717.png</image:loc>
      <image:title>JetKVM Firmware Flaw: Trusting Updates Blindly is Risky Business</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1129491012-158716/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/linkedin/telegram-1129491012-158716.png</image:loc>
      <image:title>SQL Injection Flaw Found in Sales and Inventory System</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1129491012-158699/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1550751827-4bd374c3f58b?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Apache Tomcat Suffers Critical Padding Oracle Vulnerability</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248580/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1608742213509-815b97c30b36?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Bank Staff Nabbed in Gujarat for Haryana&apos;s ₹1.75 Crore Cyber Heist</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1129491012-158689/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1642783327704-2500e96fe3d9?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Smart Slider 3 Pro Hit by Sophisticated Multi-Stage Attack</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248579/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1519575706483-221027bfbb31?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>LucidRook Malware Targets Taiwanese NGOs and Universities</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248578/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1590971862391-06cac0657603?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>VENOM Phishing Platform Targets C-Suite Microsoft Logins</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248577/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1542903660-eedba2cda473?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Iranian Hackers Target Over 5,200 US Industrial Devices</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248576/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1680992046615-065f58bcb4d8?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Fancy Bear APT&apos;s Global Reach Exposed in New Report</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1427288221-8742/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1583695477819-357b45d15825?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>TeamPCP, LAPSUS Claims: A Supply Chain Mess with Anti-Iran Twist</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1129491012-158676/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1596457233038-45a990575b2e?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>MediaWiki&apos;s ApiSandbox Vulnerable to Cross-Site Scripting</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248574/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1582266255765-fa5cf1a1d501?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Eurail Suffers Major Data Breach, 308K Travelers Exposed</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248573/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1555949963-ff9fe0c870eb?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>BlueHammer Zero-Day Exploits Microsoft&apos;s Bug Disclosure Woes</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248572/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1550751827-4bd374c3f58b?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Adobe Reader Zero-Day Exploited in the Wild, Experts Urge Analysis</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1129491012-158659/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1596457233038-45a990575b2e?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Critical Unrestricted Upload Bug Found in Pharmacy System</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248571/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1758773263238-1989d0cc788c?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>ChipSoft Ransomware Attack Disrupts Dutch Healthcare Services</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1129491012-158658/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1558459654-c430be5b0a44?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>OpenPLC_V3 Flaw Lets Attackers Bypass Auth via API</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248569/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1579397256979-cc326aefe273?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Agentic SOC: Autonomous Defense for the Next Decade</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1129491012-158652/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1550751827-4bd374c3f58b?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Homarr Dashboard Vulnerable to DOM-Based XSS</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1129491012-158651/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1633265486064-086b219458ec?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Discourse Vulnerability Leaks Staff Read Receipts</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1129491012-158650/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1563206767-5b18f218e8de?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Discourse Polls Flaw: Unauthorized State Changes Possible</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1129491012-158649/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1510511459019-5dda7724fd87?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Discourse Vulnerability: Channel Membership Inference Flaw Patched</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1129491012-158648/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1550751827-4bd374c3f58b?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Discourse Vulnerability Lets Mods Access Private Topics</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248568/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1579397256979-cc326aefe273?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Strategy Games: The Secret Weapon for Elite Threat Hunters</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248567/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1489875347897-49f64b51c1f8?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Chrome&apos;s New Defense Against Session Cookie Theft</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248566/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1548092372-0d1bd40894a3?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Police busts 57 cyber fraud rackets, 113 arrested</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248565/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1558459654-c430be5b0a44?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Cyber Ceasefires: Do They Really Slow Attacks? History Says No.</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248563/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1614064548237-096f735f344f?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>UK Cyber Innovators Secure £10M Funding Boost</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1542954397-4498/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1582266255765-fa5cf1a1d501?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Alleged Chinese Supercomputer Hack: Too Good to Be True?</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248562/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1591439657848-9f4b9ce436b9?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Mac Malware Evolves: ClickFix Attack Ditches Stealth for Bold Tactics</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1373735086-4970/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1591439657848-9f4b9ce436b9?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>DARKFEED Flags Major Military Research Data Breach</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1129491012-158640/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1548092372-0d1bd40894a3?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>OrangeHRM Flaw: Local File Reads for Authenticated Users</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1129491012-158639/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1633265486064-086b219458ec?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Nimiq Core-RS Albatross Flaw Exposes Nodes to DoS Attacks</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248560/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1653387300291-bfa1eeb90e16?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Smart Slider Updates Hijacked, Pushing Backdoored WordPress/Joomla Plugins</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1427288221-8741/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1680992044138-ce4864c2b962?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Cyber Warfare Escalates: Iran-Linked Groups Target Israel Amidst Conflict</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1129491012-158635/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1614064641938-3bbee52942c7?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Discourse Vulnerability Allows Network Probing via Email Settings</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1129491012-158634/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1614064641938-3bbee52942c7?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Discourse Subscription Flaw Lets Users Grab Higher Tiers</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1129491012-158633/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1563206767-5b18f218e8de?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Discourse Vulnerability: Draft Topic Titles Exposed</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248559/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1597733336794-12d05021d510?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Storm-2755: Payroll Pirates Hijack Canadian Salaries</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248558/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1555949963-ff9fe0c870eb?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>FBI Router Takedown Cripples Russian GRU&apos;s &apos;Tremendous Access&apos;</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248557/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1583695477819-357b45d15825?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>WhatsApp Job Scam Nabs Hyderabad Senior Citizen of ₹96 Lakh</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248556/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1504639725590-34d0984388bd?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Nigerians Face Heightened Cyber Fraud Risk Targeting Bank Accounts</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1129491012-158632/</loc>
    <image:image>
      <image:loc>https://raw.githubusercontent.com/Shimicohen1/scw-post-images/main/linkedin/telegram-1129491012-158632.png</image:loc>
      <image:title>AI Chat Interface Vulnerable to Cloud Credential Theft</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1233397458-73814/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1753998941540-081eed4f6397?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>AI Takes Center Stage at MWC 2026 for Network Security</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1233397458-73813/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1590971862391-06cac0657603?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>MWC Barcelona Security: Cisco&apos;s Unified SOC/NOC Build with Splunk</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1233397458-73812/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1608742213509-815b97c30b36?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>MWC 2026 SOC: Shadow Traffic Detection with Cisco Firepower</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248555/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1510511459019-5dda7724fd87?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Masjesu Botnet Stealthily Targets IoT Devices</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1129491012-158626/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1596457233038-45a990575b2e?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Backstage SSRF Flaw: URL Redirects Expose Internal Systems</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1129491012-158624/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1510511459019-5dda7724fd87?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Alchemy CMS RCE: Ruby Eval Flaw Opens Door for Command Execution</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1129491012-158605/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1562813733-b31f71025d54?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Docling Core RCE Bug: PyYAML Dependency a Major Risk</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248551/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1596457233038-45a990575b2e?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Android SDK Flaw Puts Millions of Wallets at Risk</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248550/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1597733336794-12d05021d510?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Cyberabad Police Nab 10 in String of Cyber Fraud Cases</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248549/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1504639725590-34d0984388bd?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Apple Intelligence AI Guardrails Cracked by Clever Prompt Injection</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248547/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1614064548237-096f735f344f?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>AI&apos;s Trust Deficit: A Necessary Evil for Security?</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1233397458-73811/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1653387137517-fbc54d488ed8?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>K-Pop Scammers Target BTS Fans with Fake Tour Tickets</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248546/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1765299856473-abaac2f1aa70?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Hybrid Botnet, Old Apache Flaw: Latest Cyber Threats Unpacked</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1233397458-73810/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1579397256979-cc326aefe273?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>UNC6783 Exploits BPOs as Launchpads for Major Breaches</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1955946092-627/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1760199789455-49098afd02f0?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>OSINT Connect France: Law Enforcement Tackles Digital Investigations</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1542954397-4497/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1596457233038-45a990575b2e?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Microsoft Blocks VeraCrypt, WireGuard Updates, Angering Open Source Devs</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248544/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1558459654-c430be5b0a44?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Android Apps Leak Gemini API Keys, Exposing Sensitive Endpoints</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248543/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1680992045535-95919d4971a9?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Unmasking Threat Actors: Turning Cyber Chatter into Actionable Intel</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248542/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1550751827-4bd374c3f58b?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Urgent Patches Released for High-Severity Flaws in PAN &amp; SonicWall Gear</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248541/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1592609930961-219235eded71?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>AI-Powered Identity Farms Spell End for Email Fraud Detection by 2027</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248540/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1682559736721-c2e77ff4c650?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Cyber Threat Intel in 2030: What to Expect</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248539/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1614064548237-096f735f344f?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>KIB Flags Rising Cyber Fraud Risks Amid Current Climate</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248535/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1563206767-5b18f218e8de?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Delhi Police&apos;s CyHawk 4.0 Busts Cybercrime Ring, Nabs 660</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248534/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1608742213509-815b97c30b36?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>NSFW App Leak Exposes User Prompts, Images, and Personal Data</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248532/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1558459654-c430be5b0a44?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Talos Year in Review: Turning Field Data into Defender Action</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248531/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1614064548237-096f735f344f?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Visibility: The Unsung Hero of Smart Security Decisions</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1707304340-2259/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1767817099805-d79e31fb968c?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Ransomware Cripples Dutch Hospitals Via ChipSoft Outage</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248529/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1583695477819-357b45d15825?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Delhi Police Nab Suspects in Multi-Lakh Investment Scams</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248527/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1563206767-5b18f218e8de?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Meta Employee Allegedly Siphoned 30K Private Facebook Images</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248525/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1591439657848-9f4b9ce436b9?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Fake Windows Support Site Hijacks Credentials with Malware</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1233397458-73805/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1542903660-eedba2cda473?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Healthcare Cyberattack Cripples Signature Healthcare Operations</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248524/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1592609930961-219235eded71?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Certes V7: Quantum-Safe Encryption for Hybrid and Edge</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248523/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1618060932014-4deda4932554?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Massive Data Heist at China Supercomputing Center Sparks Geopolitical Fears</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248522/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1555949963-ff9fe0c870eb?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>BPO Sector Under Fire: Google Flags New Corporate Data Heist Campaign</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248521/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1614064548237-096f735f344f?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>ClipBanker Trojan Hijacks Crypto via Masquerading Malware</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248520/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1558459654-c430be5b0a44?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Adobe Reader Zero-Day Exploited Since December, Data Theft Confirmed</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1542954397-4496/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1579397256979-cc326aefe273?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Anthropic&apos;s Claude AI Escapes Sandbox, Shows Unsettling Initiative</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248519/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1579397256979-cc326aefe273?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Delhi Police Nab 113 in Major Cyber Fraud Bust, Rs 22 Crore Recovered</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1597138777-3453/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1601193450490-19d012254e16?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Claude Skills for Journalists: A Deep Dive</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248518/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1642133516482-e99ea85011b3?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Keeper Security Boosts PAM with Advanced Browser Isolation</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248517/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1591439657848-9f4b9ce436b9?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Adobe&apos;s Compliance Lead on Navigating Complex Tech Security</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248516/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1633265486064-086b219458ec?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Adobe Reader Zero-Day Under Attack For Months, Researcher Reveals</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1707304340-2258/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1555949963-ff9fe0c870eb?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Palo Alto Cortex XDR Flaw Lets Local Admins Disable Defense</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248515/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1614064641938-3bbee52942c7?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Eurail Data Breach Exposes 300,000 Customer Records</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248514/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1548092372-0d1bd40894a3?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>MLA Falls for &apos;Viksit Bharat&apos; Loan Scam, Loses Rs 1 Lakh</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248512/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1510511459019-5dda7724fd87?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Exposed ICS Devices Threaten Critical Infrastructure: Cyber Threat Intelligence Warns</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1233397458-73801/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1597733336794-12d05021d510?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>ClickFix macOS Attack Exploits Script Editor, Bypassing Defenses</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1233397458-73800/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1596457233038-45a990575b2e?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Eurail Breach Exposes 300K US User Data</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1427288221-8737/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1558459654-c430be5b0a44?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>LA Metro Hit by Iranian Cyberattack Targeting Industrial Control Systems</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248511/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1653387300291-bfa1eeb90e16?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Microsoft Suspends Open Source Dev Accounts, Blocks Critical Updates</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248510/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1583695477819-357b45d15825?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Bitcoin Depot Loses $3.6M in Crypto Heist</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1129491012-158579/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1596457233038-45a990575b2e?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Jeecgboot JimuReport Vulnerability Allows Remote Code Injection</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1707304340-2256/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1550751827-4bd374c3f58b?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Anthropic&apos;s Glasswing Project: AI Powers New Cyber Defense Coalition</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1129491012-158565/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1526374965328-7f61d4dc18c5?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>WordPress Plugin Flaw Lets Subscribers Gain Admin Privileges</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1129491012-158564/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1510511459019-5dda7724fd87?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>SSRF Flaw in atototo API Tool Exposes Remote Attack Risk</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248506/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1542903660-eedba2cda473?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Forest Blizzard Malware Targets SOHO Routers for Login Data</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1129491012-158549/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1510511459019-5dda7724fd87?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>SQL Injection Bug Found in Construction Management System</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248504/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1632910138458-5bf601f3835e?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Crypto Scams, Elder Fraud Fueling $21B Cyber Theft Surge</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1373735086-4968/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1682559736721-c2e77ff4c650?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>TiMc Emerges: New Threat Actor Spotted in the Wild</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1373735086-4967/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1678811326980-ea1b88cd9e8c?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Business Services Sector Under Fire: Ransomware Groups Ramp Up Attacks</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248502/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1558494949-ef010cbdcc31?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Emojis: The New Black for Stealthy Threat Actors</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1129491012-158539/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1548092372-0d1bd40894a3?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Kafka Race Condition Flaw Sends Messages to Wrong Topics</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248500/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1614064548237-096f735f344f?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>UNC6783 Hackers Target BPOs for Zendesk Ticket Heists</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1129491012-158538/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1614064641938-3bbee52942c7?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Budibase Low-Code Platform Suffers Critical RCE Flaw</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1129491012-158537/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1614064641938-3bbee52942c7?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Budibase Low-Code Platform Suffers Critical Path Traversal Vulnerability</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1129491012-158536/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1596457233038-45a990575b2e?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Budibase SSRF Flaw: Default Config Leaves Open-Source Low-Code Exposed</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1129491012-158535/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1550751827-4bd374c3f58b?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Budibase Low-Code Platform Patches Critical Command Execution Flaw</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248499/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1695668548342-c0c1ad479aee?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>APT28 Leverages PRISMEX for Stealthy Infiltration of Ukraine, Allies</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1129491012-158527/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1555949963-ff9fe0c870eb?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>SQL Injection Flaw Found in Open Source Point of Sale</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1129491012-158526/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1758773263238-1989d0cc788c?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>AVideo Platform Hit by SSRF Vulnerability, Leaking Sensitive Data</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1129491012-158525/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1526374965328-7f61d4dc18c5?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>AVideo&apos;s PayPal Handler Vulnerable to Transaction Replay Attacks</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1129491012-158524/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1558459654-c430be5b0a44?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>MediaWiki ReportIncident Extension Flaw Exposes Wikimedia to DoS Attacks</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248498/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1487058792275-0ad4aaf24ca7?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>HackerOne Halts Bug Bounties Amid AI Remediation Chaos</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1129491012-158501/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1510511459019-5dda7724fd87?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Sales System Vulnerable to SQL Injection</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1129491012-158500/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1563206767-5b18f218e8de?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>SQL Injection Flaw Found in Sales &amp; Inventory System</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1129491012-158499/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1550751827-4bd374c3f58b?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>SQL Injection Flaw Found in Sales &amp; Inventory System</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248494/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1608742213509-815b97c30b36?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Uttarakhand STF Nabs Interstate Cyber Fraudsters in Rs 65 Lakh Heist</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248493/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1558459654-c430be5b0a44?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>CISA Mandates Urgent Patch for Exploited Ivanti EPMM Flaw</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1427288221-8736/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1590971862391-06cac0657603?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>ShinyHunters Targets Anodot, Snowflake Accounts Compromised</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1427288221-8734/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1558459654-c430be5b0a44?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Anthropic&apos;s &apos;Mythos&apos; AI Model: Too Dangerous for Public Release</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1427288221-8733/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1642133516482-e99ea85011b3?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Google Chrome&apos;s New Screen Recorder: Convenience Meets Potential Risk</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1233397458-73799/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1542831371-29b0f74f9713?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Node.js Module Resolution Flaw: A Windows LPE Nightmare</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248489/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1548092372-0d1bd40894a3?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>TeamPCP Exploits Trivy for Cisco Source Code Breach</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248487/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1680992045535-95919d4971a9?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Hack-for-hire spyware campaign targets journalists in Middle East, North Africa</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1129491012-158471/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1563206767-5b18f218e8de?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Syntx Command Approval Flaw Opens Door to RCE</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1233397458-73797/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1583695477819-357b45d15825?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Splunk Optimization: Taming Data Overload for Better Security</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1955946092-626/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1760199789455-49098afd02f0?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Unlocking Indian Identities: A Deep Dive into Phone Number OSINT</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248486/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1608742213509-815b97c30b36?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Mobile Fraud Surges in Latin America, Cyber Threat Intelligence Warns</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1129491012-158465/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1563206767-5b18f218e8de?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Critical Command Injection Flaw Undermines DSAI-Cline Security</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1129491012-158461/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1550751827-4bd374c3f58b?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Wazuh Vulnerability: Insecure Scripts Open Door to Supply Chain Attacks</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248485/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1614064641938-3bbee52942c7?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>OpenSSL Patches Critical Data Leakage Vulnerability</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248484/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1583695477819-357b45d15825?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>AI Agents Outpace Security, Leaving APIs Exposed</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248483/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1760199789455-49098afd02f0?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>APT28 Unleashes PRISMEX Malware Against Ukraine, NATO</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1129491012-158457/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1558459654-c430be5b0a44?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>FOG Project Flaw: Stored XSS Lurks in Management Tables</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248482/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1590971862391-06cac0657603?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Check Point Honors Top UK Partners at Annual Awards Ceremony</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248481/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1489875347897-49f64b51c1f8?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Comcast Exec Nicole Bucala on Data Security &amp; Emerging Threats</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248480/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1758773263238-1989d0cc788c?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>APT28&apos;s PRISMEX Malware Targets Ukraine &amp; NATO Supply Chains</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248479/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1583695477819-357b45d15825?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Full Sail University Launches IBM Cyber Defense Range on Campus</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248478/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1487058792275-0ad4aaf24ca7?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Signature Healthcare Suffers Cyberattack, Disrupting Critical Services</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1129491012-158453/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1510511459019-5dda7724fd87?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Windmill Dev Platform Suffers Critical Code Injection Flaw</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1129491012-158452/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1548092372-0d1bd40894a3?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>FLIP Platform Login Vulnerable to Brute-Force Attacks</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248476/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1579397256979-cc326aefe273?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Niobium Unleashes &apos;The Fog&apos; for Stealthy Data Exfiltration</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248475/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1548092372-0d1bd40894a3?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Apache ActiveMQ Classic RCE Vulnerability: A 13-Year Shadow</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248474/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1542903660-eedba2cda473?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Pluralsight&apos;s SecureReady Aims to Bridge Cybersecurity Skills Gap</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1129491012-158448/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1550751827-4bd374c3f58b?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Mitsubishi Electric SCADA Flaw Opens Door for Local Code Execution</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1373735086-4966/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1678811326980-ea1b88cd9e8c?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Kairos Ransomware Site Defaced: Takedown or Elaborate Hoax?</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248471/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1680992046626-418f7e910589?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Nation-State Actors Embrace Persistent, Multi-Domain Cyber Ops</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248470/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1614064548237-096f735f344f?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Russian Hackers Hijacking Routers for Spying Campaigns</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248469/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1542831371-29b0f74f9713?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>NEET Aspirant Denied Bail in Major Cyber Fraud Operation</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248468/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1550751827-4bd374c3f58b?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>FBI Reports Cybercrime Losses Skyrocketed to $21 Billion in 2025</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248467/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1548092372-0d1bd40894a3?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>FBI: Cyber Scams Raked in $21 Billion from Americans Last Year</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1129491012-158443/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1633265486064-086b219458ec?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Dell PowerProtect Agent Vulnerability Exposes Sensitive Data</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1129491012-158440/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1563206767-5b18f218e8de?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>WooCommerce Plugin Vulnerable to CSRF Attacks</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1129491012-158438/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1550751827-4bd374c3f58b?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Foreman Vulnerability Opens Door for Remote Code Execution</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/cisa-kev-CVE-2026-1340/</loc>
    <image:image>
      <image:loc>https://shimiscyberworld.com/assets/images/covers/vulnerability.svg</image:loc>
      <image:title>CVE-2026-1340 — Ivanti Endpoint Manager Mobile (EPMM): Ivanti Endpoint Manager Mobile (EPMM) Code Injection Vulnerability</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248464/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1550751827-4bd374c3f58b?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>AI Dual-Use Dilemma: Claude Mythos for Defense and Attack</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248462/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1678811326980-ea1b88cd9e8c?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Masjesu Botnet: IoT Devices Under New DDoS Attack</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248461/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1608742213509-815b97c30b36?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>SIM Card Hoard Seized in Cyber Fraud Bust</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248460/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1592609930961-219235eded71?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Delhi Police Bust International Scam Ring: ₹300 Crore Lost</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248459/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1563206767-5b18f218e8de?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Russian Hackers Exploit Routers for UK Espionage</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1233397458-73795/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1765299856473-abaac2f1aa70?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>New Lua Malware &apos;LucidRook&apos; Targets Taiwan with Sophisticated Attacks</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248457/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1550751827-4bd374c3f58b?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>US Cracks Down on Russian Hacked Router Espionage Plot</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248456/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1653387137517-fbc54d488ed8?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Cartels Hit Timeshare Owners With Advance-Fee Scams</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1233397458-73793/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1558459654-c430be5b0a44?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Critical Flowise RCE Vulnerability Under Active Exploit</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248453/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1510511459019-5dda7724fd87?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>AI Uncovers Thousands of Zero-Days: A Wake-Up Call for Cloud Security</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1129491012-158431/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1563206767-5b18f218e8de?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Apache ActiveMQ Broker RCE via Jolokia JMX Bridge</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1597138777-3452/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1590971862391-06cac0657603?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Fact-Checking Database Debunks Misinformation</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248451/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1563206767-5b18f218e8de?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Kaspersky Forecasts 2025 Financial Cybercrime Trends</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1233397458-73791/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1608742213509-815b97c30b36?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Winona County Cyberattack Triggers National Guard Deployment</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1233397458-73790/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1691435828932-911a7801adfb?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>FBI Disrupts APT28&apos;s Global DNS Hijacking Operations</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248449/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1683322499436-f4383dd59f5a?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Iran-Linked Actors Eyeing Critical Infrastructure PLCs, US Agencies Warn</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248447/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1632910138458-5bf601f3835e?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Uttar Pradesh Cops Nab 19 in Inter-State Cyber Fraud Ring</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248446/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1542903660-eedba2cda473?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Uttar Pradesh Police Nab 19 in Welfare Scheme Cyber Fraud Bust</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1233397458-73788/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1548092372-0d1bd40894a3?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>AI Project Glasswing Targets Deep Software Vulnerabilities</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1233397458-73785/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1555949963-ff9fe0c870eb?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Zero-Day Exploit Hits Adobe Reader, Threat Actors Fingerprint Victims</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1233397458-73784/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1614064641938-3bbee52942c7?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Iran-Linked APT Targets US Industrial Systems, Disrupting Operations</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1542954397-4495/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1548092372-0d1bd40894a3?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Iranian Hacktivist Group&apos;s &apos;Trump-Epstein Drip&apos; Falls Flat</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1390175645-417/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1519575706483-221027bfbb31?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>My Lovely AI Breach Exposes User Prompts and NSFW Content</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1129491012-158403/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1510511459019-5dda7724fd87?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Lollms Session Hijacking Flaw: Password Resets Don&apos;t Cut It</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248441/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1583695477819-357b45d15825?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Iran-Linked Hackers Target US Critical Infrastructure with PLC Exploits</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1129491012-158402/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1548092372-0d1bd40894a3?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>WooCommerce Plugin Vulnerable to CSRF Attacks</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1129491012-158397/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1548092372-0d1bd40894a3?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>TLS 1.3 Vulnerability: Key Updates Can Trigger Deadlock</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248439/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1680992045563-2ab442f3feee?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Iran&apos;s Cyber Offensive: April 2026 Insights from Cyber Threat Intelligence</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248438/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1653387300291-bfa1eeb90e16?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Feds Dismantle Massive Russian GRU Espionage Network Targeting Routers</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248437/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1590971862391-06cac0657603?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Iran-Linked Cyber Threats Target US Critical Infrastructure</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1129491012-158382/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1596457233038-45a990575b2e?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>OpenSSL Vulnerability: Null Pointer Dereference Leads to DoS</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248436/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1526374965328-7f61d4dc18c5?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Ninja Forms Exploit: Unauthenticated RCE Threatens WordPress Sites</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1129491012-158376/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1548092372-0d1bd40894a3?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>CI4MS CMS Vulnerable to Stored XSS via Menu Management</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1129491012-158374/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1614064641938-3bbee52942c7?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Fleet Software Vulnerability Opens Door to Root/SYSTEM Code Execution</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1129491012-158373/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1596457233038-45a990575b2e?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Fleet MDM Vulnerability: SQL Injection Threatens Sensitive Data</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248435/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1753998941540-081eed4f6397?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Cyber Fraud Smashes Records: $17.7 Billion Lost, AI Scams Surge</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1129491012-158366/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1596457233038-45a990575b2e?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>UTT HiPER Router Flaw Opens Door for Remote Command Execution</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248432/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1504639725590-34d0984388bd?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Cybercrime Costs Americans $21 Billion: FBI Report</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248431/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1678811326980-ea1b88cd9e8c?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Storm-1175 Unleashes Medusa Ransomware with Alarming Speed</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248430/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1563206767-5b18f218e8de?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Grafana Patches Critical AI Bug Leaking User Data</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248429/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1760199789463-b523db55dd8b?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>SaaS Integrator Breach Fuels Snowflake Data Theft Spree</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248427/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1579397256979-cc326aefe273?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>New AI Model: Cybersecurity Boon or Attack Boon?</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1129491012-158333/</loc>
    <image:image>
      <image:loc>https://opengraph.githubassets.com/e23775aa6645f6694e635b0b528094a7949b43d7cd573d8652605ef785157cac/parse-community/parse-server/pull/10383</image:loc>
      <image:title>CVE-2026-35200 — Parse Server is an open source backend that can be deployed to any…</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1129491012-158332/</loc>
    <image:image>
      <image:loc>https://opengraph.githubassets.com/f5cba412ab481f01b80f6dcb828adad5512bac838764a86651e484d7435fe210/emqx/CocoaMQTT/commit/010bca6f61b97d726252f61641d331a2bf82b338</image:loc>
      <image:title>CVE-2026-30867 — CocoaMQTT is a MQTT 5.0 client library for iOS and macOS written in Swift.…</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1129491012-158329/</loc>
    <image:image>
      <image:loc>https://opengraph.githubassets.com/dd1549bbe32f3b38e446613078230d12432fa0ec3cf3b7e397f37611d43c1d0c/meifukun/Web-Security-PoCs</image:loc>
      <image:title>CVE-2026-4781 — A flaw has been found in SourceCodester Sales and Inventory System 1.0. The…</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1129491012-158327/</loc>
    <image:image>
      <image:loc>https://opengraph.githubassets.com/dd1549bbe32f3b38e446613078230d12432fa0ec3cf3b7e397f37611d43c1d0c/meifukun/Web-Security-PoCs</image:loc>
      <image:title>CVE-2026-4779 — A security vulnerability has been detected in SourceCodester Sales and Inventory…</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1129491012-158325/</loc>
    <image:image>
      <image:loc>https://opengraph.githubassets.com/94a7cc7f02062aab5b3096fefaed96a54d5a4fbfb1b3d7f1d909d58a56ca80ad/python/cpython/commit/5af6ce3e7b643a30a02d22245c1e3f4a8bc0a1fe</image:loc>
      <image:title>CVE-2026-3479 — DISPUTED: The project has clarified that the documentation was incorrect, and…</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1129491012-158324/</loc>
    <image:image>
      <image:loc>https://opengraph.githubassets.com/4ccd6e3d7417395cc9b31f804c5ba85ca69674052e4e95ab60029b7b0a95c5ba/volcengine/OpenViking/commit/0251c7045b3f8092c4d2e1565115b1ba23db282f</image:loc>
      <image:title>CVE-2026-22207 — OpenViking through version 0.1.18, prior to commit 0251c70, contains a broken…</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248425/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1642133516482-e99ea85011b3?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Iranian Hackers Eye US Critical Infrastructure PLCs</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248423/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1487058792275-0ad4aaf24ca7?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Iran-Linked Hackers Target US Energy, Water Systems</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1129491012-158320/</loc>
    <image:image>
      <image:loc>https://opengraph.githubassets.com/dd1549bbe32f3b38e446613078230d12432fa0ec3cf3b7e397f37611d43c1d0c/meifukun/Web-Security-PoCs</image:loc>
      <image:title>CVE-2026-4570 — A vulnerability was identified in SourceCodester Sales and Inventory System 1.0.…</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1129491012-158318/</loc>
    <image:image>
      <image:loc>https://opengraph.githubassets.com/04eb8fca755e55d79e90e3b646ccc180212a6a9c0ab6cf0e16ab0dc2c973927f/ci4-cms-erp/ci4ms/security/advisories/GHSA-5ghq-42rg-769x</image:loc>
      <image:title>CVE-2026-35035 — CI4MS is a CodeIgniter 4-based CMS skeleton that delivers a production-ready,…</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1129491012-158316/</loc>
    <image:image>
      <image:loc>https://opengraph.githubassets.com/69a4e290718a8713326b3590e20e9363b453a50ece8cda6a14635b6a3091048d/dgraph-io/dgraph/security/advisories/GHSA-p5rh-vmhp-gvcw</image:loc>
      <image:title>CVE-2026-34976 — Dgraph is an open source distributed GraphQL database. Prior to 25.3.1, the…</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1129491012-158315/</loc>
    <image:image>
      <image:loc>https://opengraph.githubassets.com/5699c27512d95ef304868b9fe28a2aa446a53c5d8492a27cc835f7c2df8ffba1/nhost/nhost/security/advisories/GHSA-g2qj-prgh-4g9r</image:loc>
      <image:title>CVE-2026-34969 — Nhost is an open source Firebase alternative with GraphQL. Prior to 0.48.0, the…</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248421/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1583695477819-357b45d15825?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Russia Leverages Routers for Stealthy Microsoft Token Heist</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248420/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1608742213509-815b97c30b36?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Elderly Doctor Loses ₹12.3 Crore in Sophisticated Share Trading Scam</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248418/</loc>
    <image:image>
      <image:loc>https://www.bleepstatic.com/content/hl-images/2026/03/25/Hacker.jpg</image:loc>
      <image:title>Max severity Flowise RCE vulnerability now exploited in attacks</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248417/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1592609930961-219235eded71?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Cybercrime Losses Skyrocket 26% to $20.9 Billion in 2025</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1955946092-625/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1542831371-29b0f74f9713?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>OSINT Industries Challenges Your Location and Time Guessing Skills</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1233397458-73780/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1770159116807-9b2a7bb82294?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Telehealth Risks: Your Medical Data Is a Hacker&apos;s Goldmine</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1129491012-158297/</loc>
    <image:image>
      <image:loc>https://opengraph.githubassets.com/e199d34faba21c6ad1e205dcdb26b4969062b983f87a6ea45bb61139975adc59/InvoiceShelf/InvoiceShelf/releases/tag/2.2.0</image:loc>
      <image:title>CVE-2026-34365 — InvoiceShelf is an open-source web &amp; mobile app that helps track expenses,…</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248409/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1592609930961-219235eded71?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Cyber Fraud Surges Against Indians Amid US Immigration Policies</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248406/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1548092372-0d1bd40894a3?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>AI&apos;s Explosive Impact on Cybersecurity, Revealed at RSAC</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1129491012-158287/</loc>
    <image:image>
      <image:loc>https://opengraph.githubassets.com/dc4a644f0ddfa34931031f5f29f0253f510c555f6c3951ad487152994ce75783/thorsten/phpMyFAQ</image:loc>
      <image:title>CVE-2026-34729 — phpMyFAQ is an open source FAQ web application. Prior to version 4.1.1, there…</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248405/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1608742213509-815b97c30b36?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Russian Banks, Metro Hit by Major Nationwide Service Outage</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248404/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1597733336794-12d05021d510?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>RSAC 2026: AI vs. Human Defenders - The Big Debate</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248402/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1597733336794-12d05021d510?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Cybersecurity Metrics: A Deep Dive into Misleading Data</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1427288221-8732/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1608742213509-815b97c30b36?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Israel Strikes Iranian AI Hub at Sharif University</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248399/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1580596347022-d0193a6e1d82?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Automated Pentesting Tools Hit a Wall: The &apos;PoC Cliff&apos; Problem</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248398/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1487058792275-0ad4aaf24ca7?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Russian Actors Hijacking SOHO Routers for Malicious Infrastructure</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1233397458-73777/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1608742213509-815b97c30b36?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>PortSwigger and Meta Forge Bug Bounty Partnership</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1233397458-73776/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1563206767-5b18f218e8de?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>UK&apos;s Cyber Resilience Bill: What You Need to Know</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248396/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1597733336794-12d05021d510?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>GrafanaGhost Stealthily Siphons Data, Bypassing AI Defenses</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248395/</loc>
    <image:image>
      <image:loc>https://securityaffairs.com/wp-content/uploads/2026/04/image-12.png</image:loc>
      <image:title>Fast-moving Storm-1175 uses new exploits to breach networks and drop Medusa</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1233397458-73775/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1582266255765-fa5cf1a1d501?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Pentesting News: 2025 Ransomware &amp; Zombie Vuln Trends</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1955946092-622/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1680992046615-065f58bcb4d8?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Unpacking Iranian Cyber Actors: A Deep Dive</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248393/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1555949963-ff9fe0c870eb?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Claude Packaging Flaw Fuels Stealer Malware Campaign</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248392/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1592609930961-219235eded71?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Automated Pentesting Falls Short: Expert Insights</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1129491012-158285/</loc>
    <image:image>
      <image:loc>https://opengraph.githubassets.com/a0ef98a41a5ed47743554c00abc5c1f3516400b156a5c95b096e350fccc6cc8b/juju/juju/commit/26ff93c903d55b0712c6fb3f6b254710edb971d4</image:loc>
      <image:title>CVE-2025-68153 — Juju is an open source application orchestration engine that enables any…</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248391/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1597733336794-12d05021d510?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>RSAC 2026: Why People Remain Cybersecurity&apos;s Biggest Asset</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248390/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1563206767-5b18f218e8de?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Cyber Fraud Bleeds Over $17 Billion Annually, FBI Reports</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248389/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1767817099805-d79e31fb968c?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Talos Intelligence: 2025 Ransomware &amp; Zombie Vulnerabilities Unpacked</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1129491012-158277/</loc>
    <image:image>
      <image:loc>https://opengraph.githubassets.com/dd1549bbe32f3b38e446613078230d12432fa0ec3cf3b7e397f37611d43c1d0c/meifukun/Web-Security-PoCs</image:loc>
      <image:title>CVE-2026-30573 — A Business Logic vulnerability exists in SourceCodester Pharmacy Product…</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1129491012-158276/</loc>
    <image:image>
      <image:loc>https://opengraph.githubassets.com/dd1549bbe32f3b38e446613078230d12432fa0ec3cf3b7e397f37611d43c1d0c/meifukun/Web-Security-PoCs</image:loc>
      <image:title>CVE-2026-30526 — A Reflected Cross-Site Scripting (XSS) vulnerability exists in SourceCodester…</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1129491012-158275/</loc>
    <image:image>
      <image:loc>https://opengraph.githubassets.com/dd1549bbe32f3b38e446613078230d12432fa0ec3cf3b7e397f37611d43c1d0c/meifukun/Web-Security-PoCs</image:loc>
      <image:title>CVE-2026-30523 — A Business Logic vulnerability exists in SourceCodester Loan Management System…</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248386/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1608742213509-815b97c30b36?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>QR Codes Now Fueling Traffic Scam Sophistication</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/incd-alert_1987/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1680992046626-418f7e910589?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>PowerShell Scripts Deployed for Wiper Malware Attacks, INCD Warns</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248385/</loc>
    <image:image>
      <image:loc>https://securityaffairs.com/wp-content/uploads/2016/06/generic_cpu.jpg</image:loc>
      <image:title>GPUBreach exploit uses GPU memory bit-flips to achieve full system takeover</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248384/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1765299856473-abaac2f1aa70?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>GPU Rowhammer Attack Grants Root Shell Access, Researchers Find</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248383/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1642783327704-2500e96fe3d9?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Attackers Hijack SaaS Notifications for Phishing Campaigns</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248382/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1558459654-c430be5b0a44?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Year-End Surge: Old Vulnerabilities Persist, React2Shell Dominates Attacks</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1129491012-158273/</loc>
    <image:image>
      <image:loc>https://cert.pl/theme/assets/img/work-entry.png</image:loc>
      <image:title>CVE-2026-4420 — Bludit is vulnerable to Stored Cross-Site Scripting (XSS) in its page creating…</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1373735086-4964/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1695668548342-c0c1ad479aee?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>New Threat Actor Emerges: DARKFEED Sounds the Alarm</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1427288221-8730/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1753998941540-081eed4f6397?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Small Security Lapses Fuel Major Cyber Incidents, Warns Source</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248378/</loc>
    <image:image>
      <image:loc>https://securityaffairs.com/wp-content/uploads/2020/07/CISA.jpeg</image:loc>
      <image:title>U.S. CISA adds a flaw in Fortinet FortiClient EMS to its Known Exploited Vulnerabilities catalog</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248377/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1580106815433-a5b1d1d53d85?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Hong Kong Police Can Compel Encryption Key Disclosure</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1233397458-73769/</loc>
    <image:image>
      <image:loc>https://thecyberexpress.com/wp-content/uploads/CSAM.webp</image:loc>
      <image:title>Child Safety at Risk as EU CSAM Detection Law Lapses, Reporting Concerns Rise</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248376/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1680992045563-2ab442f3feee?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>German Police Unmask Key REvil Ransomware Operator</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1129491012-158269/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1590971862391-06cac0657603?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>CVE-2026-33227 — Improper validation and restriction of a classpath path name vulnerability in…</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1129491012-158268/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1608742213509-815b97c30b36?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>CVE-2026-28810 — Generation of Predictable Numbers or Identifiers vulnerability in Erlang/OTP…</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1542954397-4493/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1632910138458-5bf601f3835e?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>OpIsrael Returns: Pro-Iranian, Pro-Russian Hackers Launch Wave of Threats</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248375/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1683322499436-f4383dd59f5a?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Cambodian Scam Compound Bust: Life Sentences Raise Hope, But Will It Stick?</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248374/</loc>
    <image:image>
      <image:loc>https://securityaffairs.com/wp-content/uploads/2016/11/windows-zero-day.png</image:loc>
      <image:title>Experts published unpatched Windows zero-day BlueHammer</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1597138777-3451/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1506399558188-acca6f8cbf41?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>SharedTrace: OSINT Tool Uncovers User Data from Shared Links</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248373/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1680992045535-95919d4971a9?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>White House Proposes Major CISA Funding Cut</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248372/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1682559736721-c2e77ff4c650?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Rs 400 Cr Export Incentive Cyber Fraud Busted in Jaipur</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1233397458-73768/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1604902892819-21fa038166f8?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>REvil &amp; GandCrab Suspect Nabbed in Germany: A Win for Cyber Justice?</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1233397458-73767/</loc>
    <image:image>
      <image:loc>https://thecyberexpress.com/wp-content/uploads/FortiClientEMS.webp</image:loc>
      <image:title>FortiClientEMS Vulnerabilities Under Active Exploitation, Expose Systems to RCE</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1129491012-158260/</loc>
    <image:image>
      <image:loc>https://opengraph.githubassets.com/4671bae491d29b2f7daa7bd234dd26223b0b755c3b24a279a66ccb7da2e0d790/ParisNeo/lollms/commit/a3b2b82b84d537a9da63e63a370a6a8ad55fed34</image:loc>
      <image:title>CVE-2026-1114 — In parisneo/lollms version 2.1.0, the application&apos;s session management is…</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1129491012-158258/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1504639725590-34d0984388bd?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>CVE-2013-0270 — A flaw was found in OpenStack Keystone. A remote attacker could exploit this…</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1233397458-73764/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1597862624292-45748390b00e?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>AI &amp; Investment Scams Fuel $20B Cybercrime Surge, FBI Reports</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1233397458-73763/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1601192711792-98ed33148eb1?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>AI Fuels Sophisticated Device Code Phishing Attacks</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248370/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1680992045535-95919d4971a9?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Cyber Fraudsters Laundered Millions Through Nearly 1000 Accounts</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248369/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1680992046626-418f7e910589?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Wynn Resorts Breach: ShinyHunters Exposes 21,000 Employee Records</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248367/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1555949963-ff9fe0c870eb?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>German Authorities Pinpoint REvil and GandCrab Ransomware Masters</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248366/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1580106815433-a5b1d1d53d85?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>ISC Stormcast: Critical Vulnerabilities and Emerging Threats</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1129491012-158228/</loc>
    <image:image>
      <image:loc>https://opengraph.githubassets.com/f15bac54d67a4dfad135c728d8a22c4994f8d51da2fd97d6a69659cc2c8780d6/directus/directus/security/advisories/GHSA-8m32-p958-jg99</image:loc>
      <image:title>CVE-2026-35408 — Directus is a real-time API and App dashboard for managing SQL database…</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248364/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1579397256979-cc326aefe273?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Lagos Police Nab Suspected Cyber Fraud Ring</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248364/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1608742213509-815b97c30b36?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Lagos Police Nab Cyber Fraud Syndicate, Three Arrested</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248363/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1601192711792-98ed33148eb1?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>AI-Powered Attack Leverages GitHub for Supply Chain Compromise</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1373735086-4963/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1680992045535-95919d4971a9?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>DARKFEED Unmasks Cry0: A New Cyber Threat Actor Emerges</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248362/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1582266255765-fa5cf1a1d501?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>GPUBreach Attack: GPU Rowhammer Leads to Full System Compromise</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248361/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1653387137517-fbc54d488ed8?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Axios Breach: Social Engineering Now an Industrialized Threat</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248361/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1632910138458-5bf601f3835e?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Axios Attack: Social Engineering Goes Industrial</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1129491012-158223/</loc>
    <image:image>
      <image:loc>https://opengraph.githubassets.com/4264aa92f0a735d6dc195caa57fca3ddc44ce730b07b99142d016980d92b6200/lichess-org/lila/commit/0d5002696ae705e1888bf77de107c73de57bb1b3</image:loc>
      <image:title>CVE-2026-35208 — lichess.org is the forever free, adless and open source chess server. Any…</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1129491012-158222/</loc>
    <image:image>
      <image:loc>https://opengraph.githubassets.com/2875d45578dc34bb2fa38b0d4bb90b24bc54fe66d74150393fecb4a2e14c6cf5/openfga/openfga/security/advisories/GHSA-jwvj-g8pc-cx45</image:loc>
      <image:title>CVE-2026-34972 — OpenFGA is a high-performance and flexible authorization/permission engine…</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248360/</loc>
    <image:image>
      <image:loc>https://cyberscoop.com/wp-content/uploads/sites/3/2026/04/GettyImages-1797826758-1.jpg</image:loc>
      <image:title>Fortinet customers confront actively exploited zero-day, with a full patch still pending</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248358/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1653387300291-bfa1eeb90e16?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>FBI Reports Cyber Fraud Losses Skyrocket to $17.6 Billion</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248357/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1680992046615-065f58bcb4d8?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Cyber Threat Intelligence: Navigating the Digital Battlefield</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248356/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1489875347897-49f64b51c1f8?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>DPRK Cyber Ops Leverage LNK Phishing and GitHub C2</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248355/</loc>
    <image:image>
      <image:loc>https://www.bleepstatic.com/content/hl-images/2026/02/13/Windows_headpic.jpg</image:loc>
      <image:title>Disgruntled researcher leaks “BlueHammer” Windows zero-day exploit</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248354/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1614064548237-096f735f344f?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Microsoft Patches Classic Outlook Bug Harming Email Delivery</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1129491012-158208/</loc>
    <image:image>
      <image:loc>https://opengraph.githubassets.com/58b69ec68766ab1421f9795c8d96e3671a70827ca1b2a54bd4d90c563fec937a/OpenPrinting/cups/security/advisories/GHSA-c54j-2vqw-wpwp</image:loc>
      <image:title>CVE-2026-34990 — OpenPrinting CUPS is an open source printing system for Linux and other…</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248350/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1583695477819-357b45d15825?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Microsoft Pulls Support Assistant Tool Amid Security Concerns</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248349/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1523961131990-5ea7c61b2107?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Stalkerware Developer Gets Fine, Supervised Release</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248347/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1579397256979-cc326aefe273?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Mumbai Pensioner Loses Lakhs to Fake Gas Bill Scam</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248346/</loc>
    <image:image>
      <image:loc>https://www.bleepstatic.com/content/hl-images/2025/03/12/Medusa_headpic.jpg</image:loc>
      <image:title>Microsoft links Medusa ransomware affiliate to zero-day attacks</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248345/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1618060932014-4deda4932554?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>AI Device Code Phishing Campaign Uncovered</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248344/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1771061863061-8ffdddb28098?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Storm-1175 Escalates Medusa Ransomware Attacks on Web Assets</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1129491012-158176/</loc>
    <image:image>
      <image:loc>https://opengraph.githubassets.com/fad958969a718126244d94a90a38fdae9613a8d097476390c7ac8af0d8cfd278/ci4-cms-erp/ci4ms/releases/tag/0.31.0.0</image:loc>
      <image:title>CVE-2026-34565 — CI4MS is a CodeIgniter 4-based CMS skeleton that delivers a production-ready,…</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248343/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1653387300291-bfa1eeb90e16?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Crypto Heist: $280M Stolen After 6-Month In-Person Operation</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1129491012-158169/</loc>
    <image:image>
      <image:loc>https://opengraph.githubassets.com/0c16a08c59e34a33fdb4c0d05fa66e51659bd4f453a64639e53e8cd1cf00cc71/Secsys-FDU/LLM-Tool-Calling-CVEs/issues/7</image:loc>
      <image:title>CVE-2026-30307 — Roo Code&apos;s command auto-approval module contains a critical OS command…</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1129491012-158166/</loc>
    <image:image>
      <image:loc>https://opengraph.githubassets.com/ea294b7a60bae3a038136746356e5c21771b98611c90c24a93a52d8edc3b3149/lilmingwa13/security-research</image:loc>
      <image:title>CVE-2026-29872 — A cross-session information disclosure vulnerability exists in the…</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248342/</loc>
    <image:image>
      <image:loc>https://www.bleepstatic.com/content/hl-images/2025/01/13/CISA--headpic.jpg</image:loc>
      <image:title>CISA orders feds to patch Fortinet flaw exploited in attacks by Friday</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248341/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1579397256979-cc326aefe273?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Cyber Fraud Surges Globally, Threat Intel Reports</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1129491012-158158/</loc>
    <image:image>
      <image:loc>https://github.githubassets.com/assets/gist-og-image-54fd7dc0713e.png</image:loc>
      <image:title>CVE-2026-29954 — In KubePlus 4.1.4, the mutating webhook and kubeconfiggenerator components have…</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248338/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1504639725590-34d0984388bd?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>AI Agents Face Novel Web Attack Vectors, Researchers Reveal</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248337/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1542903660-eedba2cda473?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Barwani Collector&apos;s WhatsApp Compromised in Fraud Scheme</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248336/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1592609930961-219235eded71?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Cyber Fraud Negligence Claim Excluded by Claims-Made Policies</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248335/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1542831371-29b0f74f9713?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Cyber Threat Intelligence Exposes Alleged Scam Empire in Timor-Leste</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1542954397-4489/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1608742213509-815b97c30b36?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Ransomware Negotiation: A Growing, Lucrative Niche in Cyber</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248334/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1767817099805-d79e31fb968c?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>BKA Nabs REvil Suspects Linked to German Ransomware Spree</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248331/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1614064548237-096f735f344f?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Shadow AI: The Unseen Cyber Risk in Healthcare</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248330/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1767817099805-d79e31fb968c?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>North Korea&apos;s Modular Malware: A Evolving Cyber Threat</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248329/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1753998941540-081eed4f6397?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>OWASP GenAI Security Project Bolsters Defenses with New Tools</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248328/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1771061863061-8ffdddb28098?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Breach Monitoring Needs an Upgrade: Simple Checks Aren&apos;t Cutting It</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1373735086-4961/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1767817099805-d79e31fb968c?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Ransomware Watch: Top Targets and Threat Actors Revealed</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248327/</loc>
    <image:image>
      <image:loc>https://securityaffairs.com/wp-content/uploads/2020/07/f5-networks-bg.jpg</image:loc>
      <image:title>Attackers Exploit RCE Flaw as 14,000 F5 BIG-IP APM Instances Remain Exposed</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1233397458-73759/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1771061863061-8ffdddb28098?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Phishing Dominates Cyberattacks: UAE Council Confirms Startling Statistic</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1233397458-73758/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1597733336794-12d05021d510?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Pentesting News Drops Essential Bug Bounty Hunting Checklist</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248323/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1579397256979-cc326aefe273?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Malicious Strapi Packages Target Guardarian Users</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1233397458-73757/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1487058792275-0ad4aaf24ca7?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>North Korean Hackers Target Drift Protocol, Steal $285M</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1233397458-73756/</loc>
    <image:image>
      <image:loc>https://thecyberexpress.com/wp-content/uploads/Massachusetts-Emergency-Cyberattack.webp</image:loc>
      <image:title>Cyberattack Disrupts Massachusetts Emergency Dispatch, 911 Services Remain Active</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248321/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1592609930961-219235eded71?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>North Korean Hackers Go After Node.js Maintainers</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1233397458-73755/</loc>
    <image:image>
      <image:loc>https://thecyberexpress.com/wp-content/uploads/European-Commission-cloud-breach.webp</image:loc>
      <image:title>A Compromised Tool Opened the Door to a 91GB European Commission Data Leak</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248319/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1758773263238-1989d0cc788c?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Ransomware Gangs Exploit Drivers to Evade EDR Defenses</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1233397458-73754/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1563206767-5b18f218e8de?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Northern Ireland Schools Crippled by Education Authority Cyberattack</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1233397458-73753/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1579397256979-cc326aefe273?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>FCC Slaps $4.5M Fine on Voxbeam for Robocall Scheme</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248316/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1618060932014-4deda4932554?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>BKA Nabs REvil Masterminds Behind German Ransomware Spree</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248315/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1550751827-4bd374c3f58b?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Cyber Threat Intelligence: A Week of Security Insights</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1597138777-3450/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1597862624292-45748390b00e?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Free LinkedIn Profile Viewer Tool Emerges</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1427288221-8725/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1666615435088-4865bf5ed3fd?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Infostealer Data Leaks Now Free to Monitor</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1129491012-158104/</loc>
    <image:image>
      <image:loc>https://opengraph.githubassets.com/422b15b9f2232eab11252367b02c4f866b215361b6164a106e813f9be8ac726b/Qwh0729/cve/issues/1</image:loc>
      <image:title>CVE-2026-5620 — A vulnerability has been found in itsourcecode Construction Management System…</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248313/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1620825937374-87fc7d6bddc2?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Germany Doxes REvil/GandCrab Ransomware Leader &apos;UNKN&apos;</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248310/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1519575706483-221027bfbb31?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Phishing Scams Evolve: Traffic Fines Now Delivered Via QR Codes</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248308/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1542903660-eedba2cda473?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Delhi Busts Rs 300 Crore International Cyber Fraud Ring</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248304/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1608742213509-815b97c30b36?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Rs 300 Cr Cyber Fraud Ring Busted by Authorities</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1542954397-4488/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1592609930961-219235eded71?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Brainwaves and Heartbeats: The Next Frontier in Biometric Authentication?</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1955946092-620/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1597733336794-12d05021d510?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Cybersecurity Community Acknowledges Law Enforcement&apos;s Holiday Efforts</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1427288221-8722/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1579397256979-cc326aefe273?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>LAPSUS$ Speaks: Inside the Minds of the Notorious Cyber Group</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1129491012-158068/</loc>
    <image:image>
      <image:loc>https://opengraph.githubassets.com/60fb296d4cde332b285f078e4e74e5ad262d7fcdd1d98933f350892c73b06247/August829/CVEP/issues/29</image:loc>
      <image:title>CVE-2026-5584 — A vulnerability has been found in Fosowl agenticSeek 0.1.0. Impacted is the…</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1233397458-73751/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1510511459019-5dda7724fd87?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Security Affairs Newsletter Rounds Up Latest Malware Threats</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1373735086-4960/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1582266255765-fa5cf1a1d501?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Emerging Threat Actors Spotlighted by DARKFEED</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1129491012-158060/</loc>
    <image:image>
      <image:loc>https://opengraph.githubassets.com/a3565445e9e12ebdb1f3c160fda24c8dd3e7342bdfdb2136221766ffd4587bef/whatyourname12345/CVE</image:loc>
      <image:title>CVE-2026-5575 — A vulnerability was detected in SourceCodester/jkev Record Management System…</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248303/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1770159116807-9b2a7bb82294?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Cyber Threat Intelligence Details Latest Malware Trends in Newsletter Round 91</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1542954397-4487/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1550751827-4bd374c3f58b?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>North Korea&apos;s Crypto Heists Surge in 2025</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248302/</loc>
    <image:image>
      <image:loc>https://www.bleepstatic.com/content/hl-images/2026/04/03/screens.jpg</image:loc>
      <image:title>Hackers exploit React2Shell in automated credential theft campaign</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1427288221-8721/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1592609930961-219235eded71?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>TeamPCP Group Targets Israeli Firm Illusive Networks</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1373735086-4959/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1591439657848-9f4b9ce436b9?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Extensive Data Destruction Campaign Hits Multiple Israeli Entities</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248301/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1590971862391-06cac0657603?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Axios NPM Package Hit by Supply Chain Attack</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248300/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1583695477819-357b45d15825?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Delhi Fraud Case Unmasks Massive International Cyber Syndicate</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248299/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1608742213509-815b97c30b36?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Delhi Police Busts Major Cyber Fraud Syndicate Operating from Cambodia</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1597138777-3449/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1680992046615-065f58bcb4d8?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>APILEECH: A New Browser Extension for Web Analysis and Data Extraction</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1597138777-3448/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1550751827-4bd374c3f58b?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Cyber Detective Spotlights Free OSINT Google Dorking Tool</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1233397458-73750/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1770159116807-9b2a7bb82294?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Malware Hidden in Plain Sight: The Image File Deception</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1233397458-73749/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1487058792275-0ad4aaf24ca7?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Pentesting News Highlights Global Cybersecurity Trends in Latest Report</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1129491012-158036/</loc>
    <image:image>
      <image:loc>https://opengraph.githubassets.com/1b2189703cb8182abfe94de1cbfc288f49663bf6196be7b17e8fb95862ff43d0/Wzl731/test/issues/3</image:loc>
      <image:title>CVE-2026-5553 — A vulnerability was identified in itsourcecode Online Cellphone System 1.0.…</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1129491012-158034/</loc>
    <image:image>
      <image:loc>https://opengraph.githubassets.com/000e871fa655e4cbda733a1a99ddc2ec89edb13f5f678067950650f754fe273a/jasonwong666/cve/issues/1</image:loc>
      <image:title>CVE-2026-5551 — A security flaw has been discovered in itsourcecode Free Hotel Reservation…</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248298/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1760199789463-b523db55dd8b?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Cyber Threat Intelligence Flags Potential Image-Based Malware</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248297/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1608742213509-815b97c30b36?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Cyber Threat Intelligence Highlights Global Security Trends</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1427288221-8719/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1550751827-4bd374c3f58b?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Phishing Campaign Impersonates National Insurance, Steals Sensitive Data</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1129491012-158017/</loc>
    <image:image>
      <image:loc>https://opengraph.githubassets.com/db1c54df7b219cdb31d5447027f1d1d45e29fecc7b1c53dc8bea56b767f202da/ldan42008-ux/cve/issues/2</image:loc>
      <image:title>CVE-2026-5534 — A vulnerability was identified in itsourcecode Online Enrollment System 1.0.…</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1373735086-4958/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1691435828932-911a7801adfb?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Enterprise Network Access Hits Dark Web Market</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1373735086-4957/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1596457233038-45a990575b2e?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Darknet Monitor: This Week&apos;s Critical Data Breaches Uncovered</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248294/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1550751827-4bd374c3f58b?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>npm&apos;s Latest Attack: Fake Teams Fix Hijacks Open Source</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248293/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1771061863061-8ffdddb28098?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Claude Code Leak Fuels Malware Distribution: A Cybersecurity Wake-Up Call</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1427288221-8718/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1642133516482-e99ea85011b3?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>LinkedIn&apos;s Browser Extension Scan: A Privacy Concern?</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1707304340-2249/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1592609930961-219235eded71?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>AI Infrastructure Migrates: Gaza&apos;s Tech Moves to Lebanon and Iran</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1542954397-4485/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1562813733-b31f71025d54?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Ransomware Cartels: The Corporate Structure Behind Modern Cybercrime</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1707304340-2248/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1608742213509-815b97c30b36?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Netflix&apos;s VOID: AI That Understands Physics in Video</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248292/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1558459654-c430be5b0a44?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Single-Signal Fraud Detection is Obsolete Against Evolving Cyber Threats</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248291/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1767817099805-d79e31fb968c?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Qilin Ransomware Hits German Political Party Die Linke</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248290/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1573164713988-8665fc963095?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Real-Time Threat Intel App: Unveiling the Digital Battlefield</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1233397458-73746/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1608742213509-815b97c30b36?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>AI SEO in High-Stakes Search: Navigating Risks and Rewards</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248289/</loc>
    <image:image>
      <image:loc>https://securityaffairs.com/wp-content/uploads/2020/07/CISA.jpeg</image:loc>
      <image:title>U.S. CISA adds a flaw in TrueConf Client to its Known Exploited Vulnerabilities catalog</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1542954397-4484/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1579397256979-cc326aefe273?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>AI &apos;Emotions&apos;: Anthropic&apos;s Claude Exhibits Functional Emotional Responses</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248288/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1487058792275-0ad4aaf24ca7?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Cyber Fraudsters Nabbed: Malkajgiri Police Crack Down on 13 Suspects</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248287/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1770159116807-9b2a7bb82294?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Device Code Phishing Surges 37x Amidst Spreading Attack Kits</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248286/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1550751827-4bd374c3f58b?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>LinkedIn&apos;s Secret Chrome Extension Scan Raises Privacy Concerns</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248285/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1487058792275-0ad4aaf24ca7?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>₹1.54 Crore Lost: &apos;Digital Arrest&apos; Scam Targets Navi Mumbai Senior</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1955946092-617/</loc>
    <image:image>
      <image:loc>https://cdn.prod.website-files.com/65e2696571877968e11e87f3/69bd6ca4a58d4f12ee9f4d83_OSINT%20Training%20Log.%20Strengthening%20ASEAN%20Investigations%20into%20Child%20Exploitation.webp</image:loc>
      <image:title>26 investigators. 8 ASEAN countries. One mission.</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248284/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1753998941540-081eed4f6397?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Rs 47 Crore Fraud Busted: Surat Cyber Cell Uncovers Fake Account Network</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1542954397-4483/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1487058792275-0ad4aaf24ca7?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>UK&apos;s Pandemic Preparedness: Surveillance or Public Health?</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248282/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1771061863061-8ffdddb28098?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Trivy Supply Chain Attack Hits European Commission Data</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1233397458-73745/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1596457233038-45a990575b2e?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>EU Commission Data Breach Affects 30 European Entities</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1597138777-3447/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1610878785620-3ab2d3a2ae7b?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Unlock OSINT Potential: A Comprehensive Tool Directory</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1390175645-416/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1591439657848-9f4b9ce436b9?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Crunchyroll Breach Exposes Millions of User Support Data</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248279/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1753998941540-081eed4f6397?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Jammu Cyber Police Thwarts Over 1,200 Fraud Cases, Recovers Significant Funds</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1233397458-73744/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1590971862391-06cac0657603?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Budget Cuts Loom for CISA: Cybersecurity Under Threat?</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1233397458-73742/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1592609930961-219235eded71?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Open-Source Vulnerabilities: A Proactive Management Strategy</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1542954397-4482/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1590971862391-06cac0657603?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Third-Party Telegram Apps Caught Exfiltrating User Phone Numbers</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1233397458-73741/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1608742213509-815b97c30b36?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Supply Chain Security: The 2026 Imperative</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1542954397-4481/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1487058792275-0ad4aaf24ca7?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Microsoft Pushes Edge Further, Forcing Browser Opens on Windows Startup</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248278/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1592609930961-219235eded71?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Axios NPM Package Hijacked in Major Supply Chain Attack</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1129491012-157955/</loc>
    <image:image>
      <image:loc>https://opengraph.githubassets.com/ee7a35af5b682b4121d545034ee91c1b7ced794f992f3b048330596fc752742e/electron/electron/security/advisories/GHSA-3c8v-cfp5-9885</image:loc>
      <image:title>CVE-2026-34776 — Electron is a framework for writing cross-platform desktop applications using…</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1129491012-157949/</loc>
    <image:image>
      <image:loc>https://opengraph.githubassets.com/fdf1d857b7a2ffebfc466df83ccc766902ebaae68503b641235b583595fd5c40/electron/electron/security/advisories/GHSA-jjp3-mq3x-295m</image:loc>
      <image:title>CVE-2026-34770 — Electron is a framework for writing cross-platform desktop applications using…</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248277/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1592609930961-219235eded71?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Three Arrested in 2 Crore Share-Trading Fraud Bust</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248276/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1550751827-4bd374c3f58b?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Dream Job Scams: How Recruitment Phishing Targets Your Passwords</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1129491012-157938/</loc>
    <image:image>
      <image:loc>https://opengraph.githubassets.com/89499ff1d40a2ca1b929c0660a8a6e58f92f1101d02560cf822e5d5ae29f380a/OpenPrinting/cups/commit/88516bf6d9e34cef7a64a704b856b837f70cd220</image:loc>
      <image:title>CVE-2026-27447 — OpenPrinting CUPS is an open source printing system for Linux and other…</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248275/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1487058792275-0ad4aaf24ca7?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>App Privacy Labels: A Confusing Landscape for Consumers</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1373735086-4956/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1680992046626-418f7e910589?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>KRYBIT Emerges: A New Threat Actor on the Horizon</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1129491012-157932/</loc>
    <image:image>
      <image:loc>https://opengraph.githubassets.com/7703d8fe0ada5f656965dacd16362180696c0bb9fc8a9c0181bd140fe7451425/f/prompts.chat/commit/0f8d4c381abd7b2d7478c9fdee9522149c2d65e5</image:loc>
      <image:title>CVE-2026-22661 — prompts.chat prior to commit 0f8d4c3 contains a path traversal vulnerability in…</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1129491012-157931/</loc>
    <image:image>
      <image:loc>https://opengraph.githubassets.com/89d339935d4b42eb74b86dbb686b536a5507162e5e3c7dacae243591dfeb051d/cisagov/CSAF</image:loc>
      <image:title>CVE-2025-10681 — Storage credentials are hardcoded in the mobile app and device firmware. These…</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1373735086-4955/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1558494949-ef010cbdcc31?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>NetRunner Emerges: A New Threat Actor on the Horizon</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248273/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1590971862391-06cac0657603?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>LinkedIn&apos;s Hidden Chrome Extension Scan Raises Privacy Alarms</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248272/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1753998941540-081eed4f6397?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Cyber Fraud Negligence Claim: A Policy Puzzle</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248271/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1550751827-4bd374c3f58b?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Mumbai Sees Steep Rise in Cybercrime, Credit Card Fraud Dominates</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248270/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1753998941540-081eed4f6397?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Supply Chain Attacks: Don&apos;t Let Your Own Tools Compromise You</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248269/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1652084824351-28f85a2f680d?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Claude AI Abuse: Trust Signals Weaponized on GitHub</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1129491012-157919/</loc>
    <image:image>
      <image:loc>https://opengraph.githubassets.com/5fd6f17682c9bf4bed563f3a4fa3cdcc6187ec5d0676d3c71652523d3f28cc2f/scitokens/scitokens/commit/7a237c0f642efb9e8c36ac564b745895cca83583</image:loc>
      <image:title>CVE-2026-32716 — SciTokens is a reference library for generating and using SciTokens. Prior to…</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248268/</loc>
    <image:image>
      <image:loc>https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt7015711bd72ffc83/69cff44a7535beaa9fb4616c/Apple_progress_bar-JENYA-Alamy.jpg?disable=upscale&amp;width=1200&amp;height=630&amp;fit=crop</image:loc>
      <image:title>Apple Breaks Precedent, Patches DarkSword for iOS 18</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1233397458-73740/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1487058792275-0ad4aaf24ca7?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Axois NPM Compromise: A New Supply Chain Threat Uncovered</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248266/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1765299856473-abaac2f1aa70?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Hims &amp; Hers Hit by Data Breach via Zendesk Vulnerability</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1129491012-157907/</loc>
    <image:image>
      <image:loc>https://opengraph.githubassets.com/3ca4a758693d3bb4a6f2ad8b20f2f10e692e6f470abc2e195a952e13df918b43/moby/moby/releases/tag/docker-v29.3.1</image:loc>
      <image:title>CVE-2026-33997 — Moby is an open source container framework. Prior to version 29.3.1, a security…</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248265/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1573164713988-8665fc963095?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Axios NPM Package Compromised: A Supply Chain Security Wake-Up Call</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1542954397-4480/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1591439657848-9f4b9ce436b9?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Claude Code Leak Exploited: Fake GitHub Repos Push Infostealers</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1129491012-157894/</loc>
    <image:image>
      <image:loc>https://opengraph.githubassets.com/3ca4a758693d3bb4a6f2ad8b20f2f10e692e6f470abc2e195a952e13df918b43/moby/moby/releases/tag/docker-v29.3.1</image:loc>
      <image:title>CVE-2026-34040 — Moby is an open source container framework. Prior to version 29.3.1, a security…</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248263/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1691435828932-911a7801adfb?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Trump Budget Proposal Targets CISA Funding Cuts</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248262/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1760199789463-b523db55dd8b?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>German Political Party Suffers Qilin Ransomware Breach</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248260/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1558494949-ef010cbdcc31?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Rajasthan Police Uncover Fake Escort Service Cyber Fraud Ring</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1233397458-73739/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1487058792275-0ad4aaf24ca7?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>North Korea Linked Hackers Steal $285M in Sophisticated Crypto Heist</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248259/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1680992045563-2ab442f3feee?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>TeamPCP Attacks Escalate: Hacker Infighting Widens Blast Radius</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1129491012-157890/</loc>
    <image:image>
      <image:loc>https://opengraph.githubassets.com/31217230e49cceb8b7de00cca88125339e9dd3ef1a493325521128ab90236259/Secsys-FDU/LLM-Tool-Calling-CVEs/issues/8</image:loc>
      <image:title>CVE-2026-30311 — Ridvay Code&apos;s command auto-approval module contains a critical OS command…</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1373735086-4954/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1555949963-ff9fe0c870eb?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>UK Company&apos;s Customer Data Surfaces on Dark Web Forum</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1373735086-4953/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1680992045535-95919d4971a9?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Ransomware&apos;s 2026 Leaders: Who&apos;s Dominating the Global Attack Landscape?</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1233397458-73738/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1601192711792-98ed33148eb1?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>CrystalX RAT: The New Malware-as-a-Service Threat</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248258/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1680992044138-ce4864c2b962?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Social Media Bans for Kids: A Flawed Approach to Protection</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248257/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1680992046615-065f58bcb4d8?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>North Korean Hackers Steal $285M in Sophisticated DeFi Attack</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1373735086-4952/</loc>
    <image:image>
      <image:loc>https://darkfeed.io/wp-content/uploads/2023/05/cropped-LOGO-BLACK-BACKGROUND.jpg</image:loc>
      <image:title>Darkfeed Weekly: Crypto Job Platform Breach Exposes 46K Users</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1129491012-157873/</loc>
    <image:image>
      <image:loc>https://opengraph.githubassets.com/f28e182ca065476640d78ad7384e3c188b10dae72c7ad565af6ddd8dd9bd26bd/mdp/rotp/security/advisories/GHSA-x2h8-qmj4-g62f</image:loc>
      <image:title>CVE-2024-28862 — The Ruby One Time Password library (ROTP) is an open source library for…</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1129491012-157872/</loc>
    <image:image>
      <image:loc>https://opengraph.githubassets.com/e2c818dbd75f52cad8b4c4f2a594ec10d1112ea7787a4f7276773d1b2e78113a/onionshare/onionshare/releases/tag/v2.5</image:loc>
      <image:title>CVE-2022-21693 — OnionShare is an open source tool that lets you securely and anonymously share…</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248256/</loc>
    <image:image>
      <image:loc>https://www.bleepstatic.com/content/posts/2026/03/31/cyber-hand.jpg</image:loc>
      <image:title>Evolution of Ransomware: Multi-Extortion Ransomware Attacks</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248255/</loc>
    <image:image>
      <image:loc>https://miro.medium.com/v2/da:true/bc1f8416df0cad099e43cda2872716e5864f18a73bda2a7547ea082aca9b5632</image:loc>
      <image:title>Claude Code Leak Turns Into Malware Attack (What You Need to Know)</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248254/</loc>
    <image:image>
      <image:loc>https://www.trendmicro.com/content/dam/trendmicro/global/en/research/thumbnails/26/claudecodetomalware-976.png</image:loc>
      <image:title>Weaponizing Trust Signals: Claude Code Lures and GitHub Release Payloads</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248253/</loc>
    <image:image>
      <image:loc>https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/bltc232543381a9006f/693207a41ab840449642b8fb/factory-robots-assemble-batteries-IM_Imagery-shutterstock.jpg?disable=upscale&amp;width=1200&amp;height=630&amp;fit=crop</image:loc>
      <image:title>Chainguard Unveils Factory 2.0 to Automate Hardening the Software Supply Chain</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248252/</loc>
    <image:image>
      <image:loc>https://securityaffairs.com/wp-content/uploads/2026/04/image-4.png</image:loc>
      <image:title>CrystalX RAT: new MaaS malware combines spyware, stealer, and remote access</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248251/</loc>
    <image:image>
      <image:loc>https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt673e9c40508ebe1e/69cecafa5c46194cc718a313/Skull_painting_Peter_Horree_Alamy.jpg?disable=upscale&amp;width=1200&amp;height=630&amp;fit=crop</image:loc>
      <image:title>Picking Up &apos;Skull Vibrations&apos;? Could Be XR Headset Authentication</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248250/</loc>
    <image:image>
      <image:loc>https://isc.sans.edu/images/logos/isc/large.png</image:loc>
      <image:title>TeamPCP Supply Chain Campaign: Update 006 - CERT-EU Confirms European Commission Cloud Breach,…</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248249/</loc>
    <image:image>
      <image:loc>https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/bltdceec94ca4ee78d7/69cede0b5553ec3f3ca007ad/AI-powered-software-supply-chain-Summit_Art_Creations-shutterstock.jpg?disable=upscale&amp;width=1200&amp;height=630&amp;fit=crop</image:loc>
      <image:title>Source Code Leaks Highlight Lack of Supply Chain Oversight</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1129491012-157865/</loc>
    <image:image>
      <image:loc>https://opengraph.githubassets.com/8599d4a446f7a092e989c27a7fc58f39fc06162eaadb20cd12678b06d6119ae1/discourse/discourse/commit/080408b93d00305b51d71f63f755f43fa601884d</image:loc>
      <image:title>CVE-2026-32113 — Discourse is an open-source discussion platform. From versions 2026.1.0-latest…</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248247/</loc>
    <image:image>
      <image:loc>https://www.securityweek.com/wp-content/uploads/2023/10/cybersecurity-news.jpg</image:loc>
      <image:title>In Other News: ChatGPT Data Leak, Android Rootkit, Water Facility Hit by Ransomware</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248246/</loc>
    <image:image>
      <image:loc>https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt0bdf16aa665784b3/689f7412dc6d053d5644680d/edr_MauriceNorbert_Alamy.jpg?disable=upscale&amp;width=1200&amp;height=630&amp;fit=crop</image:loc>
      <image:title>CrowdStrike Next-Gen SIEM Can Now Ingest Microsoft Defender Telemetry</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248245/</loc>
    <image:image>
      <image:loc>https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhzgZRu55MSbdanW8-1PyCciQIyWUcB9Dv4WhQQEELGJqahN5q7MyrDJKQ77e-9-fNetZJZiaJKERrgMWTGcQ-4TKhzhWE6veQp5w3wxhUnjq3NPMifbpdn1VLYpx5nngu4GsgPknNfAV8CNTGq_L_PBri4s3xz4hp8yt7OPin9Q-Kq_xcBNqzbgHx5SkrU/s1600/supplychain.jpg</image:loc>
      <image:title>UNC1069 Social Engineering of Axios Maintainer Led to npm Supply Chain Attack</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248243/</loc>
    <image:image>
      <image:loc>https://www.securityweek.com/wp-content/uploads/2025/01/application-security-vulnerabilities.jpeg</image:loc>
      <image:title>Critical ShareFile Flaws Lead to Unauthenticated RCE</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248242/</loc>
    <image:image>
      <image:loc>https://media.newindianexpress.com/newindianexpress%2F2026-02-05%2Fm8bc3omj%2F202602053662676.jpg?rect=0%2C18%2C450%2C236&amp;amp;w=1200&amp;amp;ar=40%3A21&amp;amp;auto=format%2Ccompress&amp;amp;ogImage=true&amp;amp;mode=crop&amp;amp;enlarge=true&amp;amp;overlay=false&amp;amp;overlay_position=bottom&amp;amp;overlay_width=100</image:loc>
      <image:title>Rs 57 lakh cyber fraud busted in Gujarat exposes Chinese-linked syndicate</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248241/</loc>
    <image:image>
      <image:loc>https://www.bleepstatic.com/content/hl-images/2025/08/22/Outlook.jpg</image:loc>
      <image:title>Microsoft still working to fix Exchange Online mailbox access issues</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248239/</loc>
    <image:image>
      <image:loc>https://www.securityweek.com/wp-content/uploads/2026/04/mobile-device-security.jpg</image:loc>
      <image:title>Mobile Attack Surface Expands as Enterprises Lose Control</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248238/</loc>
    <image:image>
      <image:loc>https://www.securityweek.com/wp-content/uploads/2024/06/PHP.jpeg</image:loc>
      <image:title>React2Shell Exploited in Large-Scale Credential Harvesting Campaign</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248237/</loc>
    <image:image>
      <image:loc>https://www.securityweek.com/wp-content/uploads/2026/04/T-Mobile.jpeg</image:loc>
      <image:title>T-Mobile Sets the Record Straight on Latest Data Breach Filing</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1597138777-3446/</loc>
    <image:image>
      <image:loc>https://osintteam.com/content/images/2025/01/The-best-OSINT-Resources-by-OSINT-Team.gif</image:loc>
      <image:title>Best OSINT resources</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1542954397-4479/</loc>
    <image:image>
      <image:loc>https://cdn4.telesco.pe/file/jZru-jUDAgPVM_uWiXQEmISbJ4BB_NZaGKRJdh0qckDyq_p0kGdW8xNWQmmtDrLr-JVX6vvpMsuljGIdNmM0UHYFdlkHzbHHld93PHDhgSUoidQfk-SgbE1-ijJr3kFKbED9O67lFMHVOpaEx_yWCypGr5RdVGLXJcYBKNxlqZ9sEiErpM7jDsXalhVFyF1eoKZZulvv8QIPON3fnUEwmKlDuNr7w10Ngmmv4jQnjTBnLNPKJo0cLueFPw_MJw-mcH7v2pxlTdyfrxsd-IFnILR4rMhb4fQ88gJfZnmqMHqaBHqQz52aKfd0jW-aSQWMTeKnRz1lrewkeHx1cLYjbg.jpg</image:loc>
      <image:title>מישהו שחרר אוסף בינארים של PlayStation 4 🤔</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248236/</loc>
    <image:image>
      <image:loc>https://www.securityweek.com/wp-content/uploads/2024/01/cryptocurrency.jpeg</image:loc>
      <image:title>North Korean Hackers Drain $285 Million From Drift in 10 Seconds</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248235/</loc>
    <image:image>
      <image:loc>https://blogapp.bitdefender.com/hotforsecurity/content/images/2026/04/romance-jail.jpeg</image:loc>
      <image:title>Nigerian romance scammer jailed after being caught out by fellow fraudster</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1707304340-2246/</loc>
    <image:image>
      <image:loc>https://cdn4.telesco.pe/file/lWsaH8vVHsFuYIPfeDMasTiDtoS2UNRJuaXLi0tfZkE0wMDnOdlzBjfRx8tSCNtjMdhCBJA15CmzIEeOJhJDmK3DpK4f50RHp_XmkqSrHSFL1lg6n2-HH0RHzCWdox9O7JwAKMFBPIvPefKU1wxubFGog_8cAGrKseOGHjTGJmWp2zj-jk_wsqDowOi8YEotFA-K-Zr_KBld3tcfNE-u8Zmx8CEAbYmHSC0QqgTxhgzIB2fEn1WUrowtibiYfJHzFDVeswpG6HK40imO3L3VK-dciiRnOQbMQnJgftUTKlM3CW1OmPGhSXHAGM-Lk5GckK1bHZ_CttyzYEvXF39oYA.jpg</image:loc>
      <image:title>יישום AI שמוצא וגם מנצל חולשות לבד</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248232/</loc>
    <image:image>
      <image:loc>https://www.bleepstatic.com/content/hl-images/2025/11/10/Hacker-IAB.jpg</image:loc>
      <image:title>Man admits to locking thousands of Windows devices in extortion plot</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1233397458-73736/</loc>
    <image:image>
      <image:loc>https://thecyberexpress.com/wp-content/uploads/The-Cyber-Express-Weekly-Round-Up-April-2026.webp</image:loc>
      <image:title>The Cyber Express Weekly Roundup: Ransomware, and Supply Chain Breaches Surge</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248231/</loc>
    <image:image>
      <image:loc>https://securityaffairs.com/wp-content/uploads/2015/03/iran-cyber-warfare.jpg</image:loc>
      <image:title>Pro-Iran Handala group breached Israeli defence contractor PSK Wind Technologies</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1129491012-157841/</loc>
    <image:image>
      <image:loc>https://perfmatters.io/wp-content/uploads/2022/07/perfmatters-social-v3.png</image:loc>
      <image:title>CVE-2026-4350 — The Perfmatters plugin for WordPress is vulnerable to arbitrary file deletion…</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1233397458-73735/</loc>
    <image:image>
      <image:loc>https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjYIUyQJtaAY06QUHFJwNJq_G2-GyovxH4kqwBEFS_WweUghi5Qkid_Mrt9Qa65XBQ254P_EMWHpRQWIV17U_oQgEyStBSHWel9v8hHlWeP4ncr9BBtfD6QUhjhPlcISln2jWWNWgf2Ol-P/s1600/googlelogo_color_200x200.png</image:loc>
      <image:title>Google Workspace’s continuous approach to mitigating indirect prompt injections</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248230/</loc>
    <image:image>
      <image:loc>https://www.bleepstatic.com/content/hl-images/2025/04/02/Windows-11.jpg</image:loc>
      <image:title>Microsoft now force upgrades unmanaged Windows 11 24H2 PCs</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1427288221-8715/</loc>
    <image:image>
      <image:loc>https://blog.checkpoint.com/wp-content/uploads/2026/03/Security_Blog_800x400_02.jpg</image:loc>
      <image:title>האיראנים מטרגטים עיריות בישראל: מחקר של חברת צ&apos;קפוינט מציג כיצד האיראנים מפעילים קמפיין רחב בחודש…</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1707304340-2245/</loc>
    <image:image>
      <image:loc>https://cdn4.telesco.pe/file/lWsaH8vVHsFuYIPfeDMasTiDtoS2UNRJuaXLi0tfZkE0wMDnOdlzBjfRx8tSCNtjMdhCBJA15CmzIEeOJhJDmK3DpK4f50RHp_XmkqSrHSFL1lg6n2-HH0RHzCWdox9O7JwAKMFBPIvPefKU1wxubFGog_8cAGrKseOGHjTGJmWp2zj-jk_wsqDowOi8YEotFA-K-Zr_KBld3tcfNE-u8Zmx8CEAbYmHSC0QqgTxhgzIB2fEn1WUrowtibiYfJHzFDVeswpG6HK40imO3L3VK-dciiRnOQbMQnJgftUTKlM3CW1OmPGhSXHAGM-Lk5GckK1bHZ_CttyzYEvXF39oYA.jpg</image:loc>
      <image:title>מרכז תקשורת החירום האזורי &quot;Patriot&quot; במסצ&apos;וסטס חווה מתקפת סייבר שפגעה בתשתיות התקשורת המשרתות את…</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1707304340-2244/</loc>
    <image:image>
      <image:loc>https://cdn4.telesco.pe/file/lWsaH8vVHsFuYIPfeDMasTiDtoS2UNRJuaXLi0tfZkE0wMDnOdlzBjfRx8tSCNtjMdhCBJA15CmzIEeOJhJDmK3DpK4f50RHp_XmkqSrHSFL1lg6n2-HH0RHzCWdox9O7JwAKMFBPIvPefKU1wxubFGog_8cAGrKseOGHjTGJmWp2zj-jk_wsqDowOi8YEotFA-K-Zr_KBld3tcfNE-u8Zmx8CEAbYmHSC0QqgTxhgzIB2fEn1WUrowtibiYfJHzFDVeswpG6HK40imO3L3VK-dciiRnOQbMQnJgftUTKlM3CW1OmPGhSXHAGM-Lk5GckK1bHZ_CttyzYEvXF39oYA.jpg</image:loc>
      <image:title>השבוע נחשפו 1,452 חולשות אבטחה חדשות, כולל פגיעויות קריטיות שמערבות מערכות ארגוניות ותשתיות רגישות.</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1233397458-73730/</loc>
    <image:image>
      <image:loc>https://media.kasperskydaily.com/wp-content/uploads/sites/92/2026/04/02162535/open-source-vulnerabilities-in-ai-era-featured.jpg</image:loc>
      <image:title>Risks, emerging when developing or using open-source software</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1233397458-73727/</loc>
    <image:image>
      <image:loc>https://cyberscoop.com/wp-content/uploads/sites/3/2026/04/GettyImages-1339221504.jpg</image:loc>
      <image:title>Medtech giant Stryker says it’s back up after Iranian cyberattack</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248227/</loc>
    <image:image>
      <image:loc>https://www.bleepstatic.com/content/hl-images/2026/04/03/0_European_Union_flag.jpg</image:loc>
      <image:title>CERT-EU: European Commission hack exposes data of 30 EU entities</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1542954397-4478/</loc>
    <image:image>
      <image:loc>https://cdn4.telesco.pe/file/u4OT9LF0l3TlZbAjAAbZB_bi8zoCRDlMHTDbbNe1gjHu2cubeJHGGqVVls8MdLcwe3BR9QhZsYQAHfi9N8uaE6tCkbqrDjz6x8bonG82VngUpfbnFo7PVxHIjYy1ryA5AdE1wTMuktjPGsV8j0L4HEzNFFgsflu-G35g-gfpoOlmxLcp0YXHI69jiVPoVmVvQHF04gRUlX8VcJWPHF8prZO2umF_O0K_8SrOVlJ0CtKCQw4-fsN3To4-eYYm6-E12aN-fpY1XMcp1QF2wrZbCaOVwVNhpSgKETqlyoj_B3EoamLf8kSN1Y_IV6JpKetJi_iC7wNx2BItPNJ996ID9Q.jpg</image:loc>
      <image:title>המשך קטן לסיפור של Axios 😏</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248224/</loc>
    <image:image>
      <image:loc>https://isc.sans.edu/images/podcast1400.jpg</image:loc>
      <image:title>ISC Stormcast For Friday, April 3rd, 2026 (Fri, Apr 3rd)</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1373735086-4951/</loc>
    <image:image>
      <image:loc>https://cdn4.telesco.pe/file/uRlC5xwZDBoZI2Bhfv-7F9Ln_vWCmVplzWnV0H6BKdqP-ctfsVrfgDnGagRMDAu5WS7t5SXOuB-EHCb8p85V8jZsHcU1F2y1Ihxcmbl1EF1JnHgKqn_2vfWxzYD0OHbN_mVUc80A9l4t34SVSQHFqPFJMcSEML599J5F07hZEj8-Br3FhV6i46NrUKoJawoDGLJJ1vCG3rEy1LubKL7e7O8l2aMckz98lPeeI7PhjmYKln-43Xl87olgl95686-chMngLRpP3zPRhp4gHXZbwxqUYMt6_ajFnCDM25ivDs7f4dsMvv3p_swJyMyu2xN1-fh4K_7Twsxy2p7ae2I5WA.jpg</image:loc>
      <image:title>New Event Detected!</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248221/</loc>
    <image:image>
      <image:loc>https://media.assettype.com/freepressjournal/2026-02-06/f30bivcd/Cyber-Crime.jpg</image:loc>
      <image:title>Indore News: Cyber Cell To Arrest Accused’s Elder Brother In ₹22 Lakh Fraud Case</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248220/</loc>
    <image:image>
      <image:loc>https://cyberscoop.com/wp-content/uploads/sites/3/2026/04/GettyImages-2268244780.jpg</image:loc>
      <image:title>House Dems decry confirmed ICE usage of Paragon spyware</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1500098925-272/</loc>
    <image:image>
      <image:loc>https://jiss.org.il/wp-content/uploads/2026/03/cyber.jpg.avif</image:loc>
      <image:title>מלחמת תודעה במסווה סייבר: קבוצת ההאקרים Handala כמקרה בוחן</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1129491012-157781/</loc>
    <image:image>
      <image:loc>https://opengraph.githubassets.com/960d82fcee779538390f49ec46395eccdf88fa0c6c016058583f6fd85e8894bf/eclipse-threadx/netxduo/security/advisories/GHSA-f3rx-xrwm-q2rf</image:loc>
      <image:title>CVE-2025-55102 — A denial-of-service vulnerability exists in the NetX IPv6 component…</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248219/</loc>
    <image:image>
      <image:loc>https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/bltb4eb373845e02c10/69cec4d10268bec52dd83c55/Operation-Kerry_Taylor-Alamy.jpg?disable=upscale&amp;width=1200&amp;height=630&amp;fit=crop</image:loc>
      <image:title>Not Toying Around: Hasbro Attack May Take &apos;Weeks&apos; to Remediate</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248218/</loc>
    <image:image>
      <image:loc>https://www.bleepstatic.com/content/hl-images/2026/03/25/GitHub.jpg</image:loc>
      <image:title>Claude Code leak used to push infostealer malware on GitHub</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248215/</loc>
    <image:image>
      <image:loc>https://www.trendmicro.com/content/dam/trendmicro/global/en/research/thumbnails/26/trendai-insight-new-us-national-cyber-strategy-tn.jpg</image:loc>
      <image:title>TrendAI Insight: New U.S. National Cyber Strategy</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1427288221-8712/</loc>
    <image:image>
      <image:loc>https://cdn4.telesco.pe/file/rAqdIuzLgEHlcyYmEDNt-hc_1M4QpwPBbiwNESFgRy9sp8THi1H7DZSFoVc6q_xMnevn-btkrngkYqrNw6tFykcoTH-17u8C6kEazCptKVdx3Vwnr3G0bneT27JFfPVMCUfCcMj1rniWdfQeZs4iLAmxw6PDV5VD71-UjPvuF1AMZsNqM8Jmitevp-I7wCEJiLKArc3GBWKUJQo3kBtiAsMAjzlgqbUITcALyaVCY0yEAU6TsIr4utmvmxL3q5E8agu53mNdhVK2NeQxZlllcT3_5MLluwepk2yWBTF-BjyBHapaD2G_zt_LoAZqXyXgR04yoS7YuMKEN8F5H25CjQ.jpg</image:loc>
      <image:title>לא סייבר קלאסי ובכל זאת: אמזון מדווחת שוב על שיבושים בדאטה-סנטרים באיחוד האמירויות ובבחריין בעקבות…</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1129491012-157773/</loc>
    <image:image>
      <image:loc>https://opengraph.githubassets.com/3627328e2e961d6dbfe83abda4e2efa0d39b69967fa1638ce77ee8d3de0b72d3/fleetdm/fleet/security/advisories/GHSA-4f9r-x588-pp2h</image:loc>
      <image:title>CVE-2026-34389 — Fleet is open source device management software. Prior to 4.81.0, Fleet…</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1129491012-157772/</loc>
    <image:image>
      <image:loc>https://opengraph.githubassets.com/998fa4b05429253d4bdc6ac38d1efd852e4574f302b6eb02674005d74403d2ef/fleetdm/fleet/security/advisories/GHSA-w254-4hp5-7cvv</image:loc>
      <image:title>CVE-2026-34388 — Fleet is open source device management software. Prior to 4.81.0, a…</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1542954397-4477/</loc>
    <image:image>
      <image:loc>https://cdn4.telesco.pe/file/jZru-jUDAgPVM_uWiXQEmISbJ4BB_NZaGKRJdh0qckDyq_p0kGdW8xNWQmmtDrLr-JVX6vvpMsuljGIdNmM0UHYFdlkHzbHHld93PHDhgSUoidQfk-SgbE1-ijJr3kFKbED9O67lFMHVOpaEx_yWCypGr5RdVGLXJcYBKNxlqZ9sEiErpM7jDsXalhVFyF1eoKZZulvv8QIPON3fnUEwmKlDuNr7w10Ngmmv4jQnjTBnLNPKJo0cLueFPw_MJw-mcH7v2pxlTdyfrxsd-IFnILR4rMhb4fQ88gJfZnmqMHqaBHqQz52aKfd0jW-aSQWMTeKnRz1lrewkeHx1cLYjbg.jpg</image:loc>
      <image:title>תוקף טוען שפרץ ל-Adobe 🔫</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248213/</loc>
    <image:image>
      <image:loc>https://www.thehindu.com/theme/images/og-image.png</image:loc>
      <image:title>Three bank employees arrested in connection with cyber fraud case in Sathupalli</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248212/</loc>
    <image:image>
      <image:loc>https://www.bleepstatic.com/content/hl-images/2026/03/31/cryptocurrency.jpg</image:loc>
      <image:title>Drift loses $280 million as hackers seize Security Council powers</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248211/</loc>
    <image:image>
      <image:loc>https://securityaffairs.com/wp-content/uploads/2026/04/Hasbro.jpeg</image:loc>
      <image:title>Hasbro hit by cyberattack, investigates possible data breach</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248210/</loc>
    <image:image>
      <image:loc>https://blog.talosintelligence.com/content/images/size/w1200/2026/04/threat_source.jpg</image:loc>
      <image:title>The democratisation of business email compromise fraud</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248208/</loc>
    <image:image>
      <image:loc>https://securityaffairs.com/wp-content/uploads/2014/07/cisco-building.jpg</image:loc>
      <image:title>Cisco fixed critical and high-severity flaws</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248205/</loc>
    <image:image>
      <image:loc>https://media.assettype.com/freepressjournal/2025-10-15/eadorwji/Cyber-Crime-6.jpg</image:loc>
      <image:title>Mumbai Crime: Furniture Firm Duped Of ₹89 Lakh In Email Spoofing Scam; Cyber Police Probe…</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248203/</loc>
    <image:image>
      <image:loc>https://www.microsoft.com/en-us/security/blog/wp-content/uploads/2026/03/word-image-146176-1.png</image:loc>
      <image:title>Threat actor abuse of AI accelerates from tool to cyberattack surface</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1542954397-4476/</loc>
    <image:image>
      <image:loc>https://blog.checkpoint.com/wp-content/uploads/2026/03/Security_Blog_800x400_02.jpg</image:loc>
      <image:title>בזמן שאיראן יורה מלמעלה, מישהו ניסה לעבוד גם מלמטה על הענן 😏</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1233397458-73723/</loc>
    <image:image>
      <image:loc>https://securityaffairs.com/wp-content/uploads/2026/04/image-3-scaled.png</image:loc>
      <image:title>Threat actor UAC-0255 impersonate CERT-UA to spread AGEWHEEZE malware via phishing</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248199/</loc>
    <image:image>
      <image:loc>https://cyberscoop.com/wp-content/uploads/sites/3/2026/04/akira.jpeg</image:loc>
      <image:title>Akira ransomware group can achieve initial access to data encryption in less than an hour</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248198/</loc>
    <image:image>
      <image:loc>https://www.microsoft.com/en-us/security/blog/wp-content/uploads/2026/02/MS_Actional-Insights_Detection-hunting.png</image:loc>
      <image:title>Cookie-controlled PHP webshells: A stealthy tradecraft in Linux hosting environments</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248196/</loc>
    <image:image>
      <image:loc>https://cyberscoop.com/wp-content/uploads/sites/3/2026/04/GettyImages-2228505044.jpg</image:loc>
      <image:title>Lawmakers renew push for Labor Department-backed cyber apprenticeship grants</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1373735086-4950/</loc>
    <image:image>
      <image:loc>https://cdn4.telesco.pe/file/aXmbvFH1HmVOECcrpuQL1CpeRaaglci5IU_ZlCP3KZFOxH3qRRV2JsKszM9sRl6zW1N1fmrgNLpfXpjwV9jj5CRO9tAnQlOSa8lEsEvZF8JQxkN_lXLlfN8Cu2bLHZ_1M1oESQDABQwJ3vmOb80xFo44QPCphk3In1oab9tBsYjlYHrm81EWnpAgH0zauGoFhpaLFzOdQUrD2YzmT60OXWABo0hj7g-0MWZRvrbBTxo3AcpgQddkkDVmcDRG2cAsZA9dqRdN_dSJr4ibpC_fkJtxvz49Z2Pr-AwItWPOn9J2X16DQ6YBBcLj8QqcWzXUffvKkvJQN7_1jkXJ5LpxEA.jpg</image:loc>
      <image:title>New Event Detected!</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1233397458-73722/</loc>
    <image:image>
      <image:loc>https://blog.talosintelligence.com/content/images/size/w1200/2026/04/2025YiR-report_cover.jpg</image:loc>
      <image:title>[Video] The TTP Ep 21: When Attackers Become Trusted Users</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248174/</loc>
    <image:image>
      <image:loc>https://shimiscyberworld.com/assets/images/feed/telegram-1323386230-248174.jpg</image:loc>
      <image:title>250,000 Affected by Data Breach at Nacogdoches Memorial Hospital</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/cisa-kev-CVE-2026-3502/</loc>
    <image:image>
      <image:loc>https://shimiscyberworld.com/assets/images/covers/vulnerability.svg</image:loc>
      <image:title>CVE-2026-3502 — TrueConf Client: TrueConf Client Download of Code Without Integrity Check Vulnerability</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248171/</loc>
    <image:image>
      <image:loc>https://shimiscyberworld.com/assets/images/feed/telegram-1323386230-248171.jpg</image:loc>
      <image:title>Ransomware Will Hit Hospitals. Rehearsals Are Key to Defense</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1129491012-157674/</loc>
    <image:image>
      <image:loc>https://shimiscyberworld.com/assets/images/feed/telegram-1129491012-157674.jpg</image:loc>
      <image:title>CVE-2026-5326 — A vulnerability was identified in SourceCodester Leave Application System 1.0.…</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248170/</loc>
    <image:image>
      <image:loc>https://shimiscyberworld.com/assets/images/feed/telegram-1323386230-248170.jpg</image:loc>
      <image:title>Critical Cisco IMC auth bypass gives attackers Admin access</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248168/</loc>
    <image:image>
      <image:loc>https://shimiscyberworld.com/assets/images/feed/telegram-1323386230-248168.jpg</image:loc>
      <image:title>UAT-10608: Inside a large-scale automated credential harvesting operation targeting web applications</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248167/</loc>
    <image:image>
      <image:loc>https://shimiscyberworld.com/assets/images/feed/telegram-1323386230-248167.jpg</image:loc>
      <image:title>Qilin EDR killer infection chain</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248166/</loc>
    <image:image>
      <image:loc>https://shimiscyberworld.com/assets/images/feed/telegram-1323386230-248166.jpg</image:loc>
      <image:title>Inside the Talos 2025 Year in Review: A discussion on what the data means for defenders</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248165/</loc>
    <image:image>
      <image:loc>https://shimiscyberworld.com/assets/images/feed/telegram-1323386230-248165.jpg</image:loc>
      <image:title>An overview of ransomware threats in Japan in 2025 and early detection insights from Qilin cases</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1129491012-157666/</loc>
    <image:image>
      <image:loc>https://shimiscyberworld.com/assets/images/feed/telegram-1129491012-157666.jpg</image:loc>
      <image:title>CVE-2026-33613 — Due to the improper neutralisation of special elements used in an OS command, a…</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1542954397-4474/</loc>
    <image:image>
      <image:loc>https://shimiscyberworld.com/assets/images/feed/telegram-1542954397-4474.jpg</image:loc>
      <image:title>בזמן שכולם מסתכלים על הקורבנות, TeamPCP ו-ShinyHunters פתחו קרקס משלהן</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248161/</loc>
    <image:image>
      <image:loc>https://shimiscyberworld.com/assets/images/feed/telegram-1323386230-248161.jpg</image:loc>
      <image:title>Microsoft links Classic Outlook issue to email delivery problems</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1233397458-73717/</loc>
    <image:image>
      <image:loc>https://shimiscyberworld.com/assets/images/feed/telegram-1233397458-73717.jpg</image:loc>
      <image:title>Vietnam-Linked PXA Stealer Campaign Exploits LinkedIn to Target Professionals Globally</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1233397458-73715/</loc>
    <image:image>
      <image:loc>https://shimiscyberworld.com/assets/images/feed/telegram-1233397458-73715.jpg</image:loc>
      <image:title>FBI Warns of AVrecon Malware Targeting Network Devices Across 163 Countries</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248160/</loc>
    <image:image>
      <image:loc>https://shimiscyberworld.com/assets/images/feed/telegram-1323386230-248160.jpg</image:loc>
      <image:title>Over 14,000 F5 BIG-IP APM instances still exposed to RCE attacks</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1233397458-73713/</loc>
    <image:image>
      <image:loc>https://shimiscyberworld.com/assets/images/feed/telegram-1233397458-73713.jpg</image:loc>
      <image:title>Intesa Sanpaolo Missed Unauthorized Access for 2 Years, Regulator Reveals</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1233397458-73712/</loc>
    <image:image>
      <image:loc>https://shimiscyberworld.com/assets/images/feed/telegram-1233397458-73712.jpg</image:loc>
      <image:title>Hasbro Discloses Cyberattack After Unauthorized Network Access Detected</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1233397458-73708/</loc>
    <image:image>
      <image:loc>https://shimiscyberworld.com/assets/images/feed/telegram-1233397458-73708.jpg</image:loc>
      <image:title>Securing the open source supply chain across GitHub</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248159/</loc>
    <image:image>
      <image:loc>https://shimiscyberworld.com/assets/images/feed/telegram-1323386230-248159.jpg</image:loc>
      <image:title>The DevSecOps Paradox: How the TeamPCP Supply Chain Attack Turned Cisco’s Security Tools Into…</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248158/</loc>
    <image:image>
      <image:loc>https://shimiscyberworld.com/assets/images/feed/telegram-1323386230-248158.jpg</image:loc>
      <image:title>Variance Raises $21.5M for Compliance Investigation Platform Powered by AI Agents</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248157/</loc>
    <image:image>
      <image:loc>https://shimiscyberworld.com/assets/images/feed/telegram-1323386230-248157.jpg</image:loc>
      <image:title>Italian spyware vendor creates Fake WhatsApp app, targeting 200 users</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248156/</loc>
    <image:image>
      <image:loc>https://shimiscyberworld.com/assets/images/feed/telegram-1323386230-248156.jpg</image:loc>
      <image:title>Guardia Civil recovers €17,000 in Huércal-Overa cyber fraud case</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1129491012-157655/</loc>
    <image:image>
      <image:loc>https://shimiscyberworld.com/assets/images/feed/telegram-1129491012-157655.jpg</image:loc>
      <image:title>CVE-2026-5325 — A vulnerability was determined in SourceCodester Simple Customer Relationship…</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1542954397-4473/</loc>
    <image:image>
      <image:loc>https://shimiscyberworld.com/assets/images/feed/telegram-1542954397-4473.jpg</image:loc>
      <image:title>איראן ממשיכה להילחם עם AWS 😅</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248153/</loc>
    <image:image>
      <image:loc>https://shimiscyberworld.com/assets/images/feed/telegram-1323386230-248153.jpg</image:loc>
      <image:title>Cyber Threat Intelligence Using Machine Learning: Transforming Proactive Defense</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1129491012-157648/</loc>
    <image:image>
      <image:loc>https://opengraph.githubassets.com/d6a9bcd39c6101b429341bfb88017472d8e4bb78867cb444b8b924c3090be5cc/ltranquility/submit/issues/5</image:loc>
      <image:title>CVE-2026-5319 — A security vulnerability has been detected in itsourcecode Payroll Management…</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248152/</loc>
    <image:image>
      <image:loc>https://shimiscyberworld.com/assets/images/feed/telegram-1323386230-248152.jpg</image:loc>
      <image:title>Linx Security Raises $50 Million for Identity Security and Governance</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248151/</loc>
    <image:image>
      <image:loc>https://shimiscyberworld.com/assets/images/feed/telegram-1323386230-248151.jpg</image:loc>
      <image:title>Axios npm Supply Chain Attack — 12 vendor reports correlated into one unified threat intelligence…</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248148/</loc>
    <image:image>
      <image:loc>https://shimiscyberworld.com/assets/images/feed/telegram-1323386230-248148.jpg</image:loc>
      <image:title>U.S. CISA adds a flaw in Google Dawn to its Known Exploited Vulnerabilities catalog</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248147/</loc>
    <image:image>
      <image:loc>https://shimiscyberworld.com/assets/images/feed/telegram-1323386230-248147.jpg</image:loc>
      <image:title>Smashing Security podcast 461: This man hid $400 million in a fishing rod. Then it vanished</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1129491012-157635/</loc>
    <image:image>
      <image:loc>https://shimiscyberworld.com/assets/images/feed/telegram-1129491012-157635.jpg</image:loc>
      <image:title>CVE-2026-34560 — CI4MS is a CodeIgniter 4-based CMS skeleton that delivers a production-ready,…</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1129491012-157634/</loc>
    <image:image>
      <image:loc>https://shimiscyberworld.com/assets/images/feed/telegram-1129491012-157634.jpg</image:loc>
      <image:title>CVE-2026-34559 — CI4MS is a CodeIgniter 4-based CMS skeleton that delivers a production-ready,…</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248145/</loc>
    <image:image>
      <image:loc>https://shimiscyberworld.com/assets/images/feed/telegram-1323386230-248145.jpg</image:loc>
      <image:title>Wikipedia’s AI agent row likely just the beginning of the bot-ocalypse</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248144/</loc>
    <image:image>
      <image:loc>https://shimiscyberworld.com/assets/images/feed/telegram-1323386230-248144.jpg</image:loc>
      <image:title>Mitigating the Axios npm supply chain compromise</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248143/</loc>
    <image:image>
      <image:loc>https://shimiscyberworld.com/assets/images/feed/telegram-1323386230-248143.jpg</image:loc>
      <image:title>Apple expands iOS 18 updates to more iPhones to block DarkSword attacks</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248142/</loc>
    <image:image>
      <image:loc>https://shimiscyberworld.com/assets/images/feed/telegram-1323386230-248142.jpg</image:loc>
      <image:title>Hackers exploit TrueConf zero-day to push malicious software updates</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1129491012-157620/</loc>
    <image:image>
      <image:loc>https://shimiscyberworld.com/assets/images/feed/telegram-1129491012-157620.jpg</image:loc>
      <image:title>CVE-2026-26056 — Yoke is a Helm-inspired infrastructure-as-code (IaC) package deployer. In…</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248139/</loc>
    <image:image>
      <image:loc>https://shimiscyberworld.com/assets/images/feed/telegram-1323386230-248139.jpg</image:loc>
      <image:title>Google fixes fourth actively exploited Chrome zero-day of 2026</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248138/</loc>
    <image:image>
      <image:loc>https://shimiscyberworld.com/assets/images/feed/telegram-1323386230-248138.jpg</image:loc>
      <image:title>Frequently Asked Questions About the Axios npm Supply Chain Attack by North Korea-Nexus Threat…</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248134/</loc>
    <image:image>
      <image:loc>https://shimiscyberworld.com/assets/images/feed/telegram-1323386230-248134.jpg</image:loc>
      <image:title>LatAm&apos;s Self-Taught Cyber Talent Overlooked Amid Cyberattack Glut</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248133/</loc>
    <image:image>
      <image:loc>https://shimiscyberworld.com/assets/images/feed/telegram-1323386230-248133.jpg</image:loc>
      <image:title>Five cyber criminals linked to Chinese fraud syndicate held for supplying over 600 Indian SIM cards</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248132/</loc>
    <image:image>
      <image:loc>https://shimiscyberworld.com/assets/images/feed/telegram-1323386230-248132.jpg</image:loc>
      <image:title>Cyber Fraud Alert: Major SIM Card Trafficking Network Busted</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248128/</loc>
    <image:image>
      <image:loc>https://shimiscyberworld.com/assets/images/feed/telegram-1323386230-248128.jpg</image:loc>
      <image:title>Telangana cyber security arrests 5 linked to Chinese fraud syndicate in Cambodia</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1233397458-73707/</loc>
    <image:image>
      <image:loc>https://shimiscyberworld.com/assets/images/feed/telegram-1233397458-73707.jpg</image:loc>
      <image:title>CrystalX RAT: a Trojan for pranks, remote access, and cryptocurrency theft | Kaspersky official blog</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248126/</loc>
    <image:image>
      <image:loc>https://shimiscyberworld.com/assets/images/feed/telegram-1323386230-248126.jpg</image:loc>
      <image:title>Five arrested in Telangana for supplying 600+ SIM cards to Cambodia-based cyber fraud syndicate</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248125/</loc>
    <image:image>
      <image:loc>https://shimiscyberworld.com/assets/images/feed/telegram-1323386230-248125.jpg</image:loc>
      <image:title>Cyberattacks Intensify Pressure on Latin American Governments</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248124/</loc>
    <image:image>
      <image:loc>https://shimiscyberworld.com/assets/images/feed/telegram-1323386230-248124.jpg</image:loc>
      <image:title>Depthfirst Raises $80 Million in Series B Funding</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1233397458-73705/</loc>
    <image:image>
      <image:loc>https://shimiscyberworld.com/assets/images/feed/telegram-1233397458-73705.jpg</image:loc>
      <image:title>How to Prevent Software Supply Chain Attacks</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248122/</loc>
    <image:image>
      <image:loc>https://shimiscyberworld.com/assets/images/feed/telegram-1323386230-248122.jpg</image:loc>
      <image:title>Your npm Install Last Night May Have Run Malware — The axios Attack Explained</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248121/</loc>
    <image:image>
      <image:loc>https://shimiscyberworld.com/assets/images/feed/telegram-1323386230-248121.jpg</image:loc>
      <image:title>Toy Giant Hasbro Hit by Cyberattack</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248120/</loc>
    <image:image>
      <image:loc>https://shimiscyberworld.com/assets/images/feed/telegram-1323386230-248120.jpg</image:loc>
      <image:title>International Cyber-Fraud Racket Busted in Gurugram</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1373735086-4949/</loc>
    <image:image>
      <image:loc>https://shimiscyberworld.com/assets/images/feed/telegram-1373735086-4949.jpg</image:loc>
      <image:title>New Event Detected!</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1373735086-4948/</loc>
    <image:image>
      <image:loc>https://shimiscyberworld.com/assets/images/feed/telegram-1373735086-4948.jpg</image:loc>
      <image:title>New Event Detected!</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248119/</loc>
    <image:image>
      <image:loc>https://shimiscyberworld.com/assets/images/feed/telegram-1323386230-248119.jpg</image:loc>
      <image:title>Venom Stealer MaaS Platform Commoditizes ClickFix Attacks</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248118/</loc>
    <image:image>
      <image:loc>https://shimiscyberworld.com/assets/images/feed/telegram-1323386230-248118.jpg</image:loc>
      <image:title>New DeepLoad Malware Dropped in ClickFix Attacks</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248117/</loc>
    <image:image>
      <image:loc>https://shimiscyberworld.com/assets/images/feed/telegram-1323386230-248117.jpg</image:loc>
      <image:title>Your AI Gateway Was a Backdoor: Inside the LiteLLM Supply Chain Compromise</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1129491012-157565/</loc>
    <image:image>
      <image:loc>https://shimiscyberworld.com/assets/images/feed/telegram-1129491012-157565.jpg</image:loc>
      <image:title>CVE-2026-33747 — BuildKit is a toolkit for converting source code to build artifacts in an…</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248116/</loc>
    <image:image>
      <image:loc>https://shimiscyberworld.com/assets/images/feed/telegram-1323386230-248116.jpg</image:loc>
      <image:title>Google links Axios npm supply chain attack to North Korea-linked APT UNC1069</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248115/</loc>
    <image:image>
      <image:loc>https://shimiscyberworld.com/assets/images/feed/telegram-1323386230-248115.jpg</image:loc>
      <image:title>WhatsApp on Windows users targeted in new campaign, warns Microsoft</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248113/</loc>
    <image:image>
      <image:loc>https://shimiscyberworld.com/assets/images/feed/telegram-1323386230-248113.jpg</image:loc>
      <image:title>European-Chinese geopolitical issues drive renewed cyberespionage campaign</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248112/</loc>
    <image:image>
      <image:loc>https://shimiscyberworld.com/assets/images/feed/telegram-1323386230-248112.jpg</image:loc>
      <image:title>Routine Access Is Powering Modern Intrusions, a New Threat Report Finds</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248110/</loc>
    <image:image>
      <image:loc>https://shimiscyberworld.com/assets/images/feed/telegram-1323386230-248110.jpg</image:loc>
      <image:title>Woman alleges bank account misused for cyber fraud</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1129491012-157562/</loc>
    <image:image>
      <image:loc>https://shimiscyberworld.com/assets/images/feed/telegram-1129491012-157562.jpg</image:loc>
      <image:title>CVE-2026-33674 — PrestaShop is an open source e-commerce web application. Versions prior to…</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1129491012-157561/</loc>
    <image:image>
      <image:loc>https://shimiscyberworld.com/assets/images/feed/telegram-1129491012-157561.jpg</image:loc>
      <image:title>CVE-2026-33673 — PrestaShop is an open source e-commerce web application. Versions prior to…</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248104/</loc>
    <image:image>
      <image:loc>https://shimiscyberworld.com/assets/images/feed/telegram-1323386230-248104.jpg</image:loc>
      <image:title>Webinar Today: Agentic AI vs. Identity’s Last Mile Problem</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248102/</loc>
    <image:image>
      <image:loc>https://shimiscyberworld.com/assets/images/feed/telegram-1323386230-248102.jpg</image:loc>
      <image:title>Why we’re still not doing April Fools’ Day</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248100/</loc>
    <image:image>
      <image:loc>https://shimiscyberworld.com/assets/images/feed/telegram-1323386230-248100.jpg</image:loc>
      <image:title>Axios NPM Library Delivering Malware Attack</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248099/</loc>
    <image:image>
      <image:loc>https://shimiscyberworld.com/assets/images/feed/telegram-1323386230-248099.jpg</image:loc>
      <image:title>The Forgotten Endpoint: Security Risks of Dormant Devices</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248098/</loc>
    <image:image>
      <image:loc>https://shimiscyberworld.com/assets/images/feed/telegram-1323386230-248098.jpg</image:loc>
      <image:title>Cyber fraud racket linked to Philippines, Cambodia busted in Gurugram; 5 arrested</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1373735086-4947/</loc>
    <image:image>
      <image:loc>https://shimiscyberworld.com/assets/images/feed/telegram-1373735086-4947.jpg</image:loc>
      <image:title>March 2026 Summary — Monthly Ransomware &amp; Cyber Attack Report</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1233397458-73703/</loc>
    <image:image>
      <image:loc>https://shimiscyberworld.com/assets/images/feed/telegram-1233397458-73703.jpg</image:loc>
      <image:title>Google Chrome Update Fixes 21 Flaws, Warns of Actively Exploited Vulnerability</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/cisa-kev-CVE-2026-5281/</loc>
    <image:image>
      <image:loc>https://shimiscyberworld.com/assets/images/covers/vulnerability.svg</image:loc>
      <image:title>CVE-2026-5281 — Google Dawn: Google Dawn Use-After-Free Vulnerability</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248097/</loc>
    <image:image>
      <image:loc>https://shimiscyberworld.com/assets/images/feed/telegram-1323386230-248097.jpg</image:loc>
      <image:title>Mumbai judge falls victim to cyber fraud while trying to ger his phone repaired, loses ₹93,000</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248096/</loc>
    <image:image>
      <image:loc>https://shimiscyberworld.com/assets/images/feed/telegram-1323386230-248096.jpg</image:loc>
      <image:title>CultureAI Launches on Microsoft Marketplace to Accelerate Secure AI Adoption</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248095/</loc>
    <image:image>
      <image:loc>https://shimiscyberworld.com/assets/images/feed/telegram-1323386230-248095.jpg</image:loc>
      <image:title>FBI warns against using Chinese mobile apps due to privacy risks</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248094/</loc>
    <image:image>
      <image:loc>https://shimiscyberworld.com/assets/images/feed/telegram-1323386230-248094.jpg</image:loc>
      <image:title>Identity Threat Intelligence Report: How Infostealer Malware Is Reshaping Cyber Risk?</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1129491012-157550/</loc>
    <image:image>
      <image:loc>https://shimiscyberworld.com/assets/images/feed/telegram-1129491012-157550.jpg</image:loc>
      <image:title>CVE-2026-28038 — Missing Authorization vulnerability in Brainstorm Force Ultimate Addons for…</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248092/</loc>
    <image:image>
      <image:loc>https://shimiscyberworld.com/assets/images/feed/telegram-1323386230-248092.jpg</image:loc>
      <image:title>&apos;Send Your Daughter To Me’: Akola Cop Suspended Over Alleged Sexual Favour Demand From Cyber Fraud…</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248090/</loc>
    <image:image>
      <image:loc>https://shimiscyberworld.com/assets/images/feed/telegram-1323386230-248090.jpg</image:loc>
      <image:title>Are We Training AI Too Late?</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1955946092-614/</loc>
    <image:image>
      <image:loc>https://shimiscyberworld.com/assets/images/feed/telegram-1955946092-614.jpg</image:loc>
      <image:title>Day 2 at FIC 🇫🇷 — Come and see our robot dog.</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248088/</loc>
    <image:image>
      <image:loc>https://shimiscyberworld.com/assets/images/feed/telegram-1323386230-248088.jpg</image:loc>
      <image:title>Evil Merge: The Git Attack That Hid Malware in Plain Sight for 3.5 Months</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1427288221-8708/</loc>
    <image:image>
      <image:loc>https://shimiscyberworld.com/assets/images/feed/telegram-1427288221-8708.jpg</image:loc>
      <image:title>חברת Bright Data הישראלית (שירותי כריית נתונים) מדווחת למשתמשים על חשש לדלף מידע ודרישה לאיפוס…</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248085/</loc>
    <image:image>
      <image:loc>https://shimiscyberworld.com/assets/images/feed/telegram-1323386230-248085.jpg</image:loc>
      <image:title>SentinelOne autonomous detection blocks trojaned LiteLLM triggered by Claude Code</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1597138777-3445/</loc>
    <image:image>
      <image:loc>https://shimiscyberworld.com/assets/images/feed/telegram-1597138777-3445.jpg</image:loc>
      <image:title>TLDSweep — &quot;Sweeps a domain name across 800+ TLDs to discover what&apos;s registered, who owns it, and…</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1233397458-73701/</loc>
    <image:image>
      <image:loc>https://shimiscyberworld.com/assets/images/feed/telegram-1233397458-73701.jpg</image:loc>
      <image:title>AI Startup Mercor Hit by Supply Chain Attack Linked to LiteLLM</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1955946092-613/</loc>
    <image:image>
      <image:loc>https://shimiscyberworld.com/assets/images/feed/telegram-1955946092-613.jpg</image:loc>
      <image:title>How terrorists use the internet 🌐</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248084/</loc>
    <image:image>
      <image:loc>https://shimiscyberworld.com/assets/images/feed/telegram-1323386230-248084.jpg</image:loc>
      <image:title>Alleged RedLine malware developer extradited to United States</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248083/</loc>
    <image:image>
      <image:loc>https://shimiscyberworld.com/assets/images/feed/telegram-1323386230-248083.jpg</image:loc>
      <image:title>How a pink line on an Android phone led to a Mumbai judge losing Rs 93,000 in cyber fraud</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1390175645-414/</loc>
    <image:image>
      <image:loc>https://shimiscyberworld.com/assets/images/feed/telegram-1390175645-414.jpg</image:loc>
      <image:title>🆕 New breach: SUCCESS - 253,510 breached accounts</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248082/</loc>
    <image:image>
      <image:loc>https://shimiscyberworld.com/assets/images/feed/telegram-1323386230-248082.jpg</image:loc>
      <image:title>Axios NPM Package Breached in North Korean Supply Chain Attack</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1233397458-73699/</loc>
    <image:image>
      <image:loc>https://shimiscyberworld.com/assets/images/feed/telegram-1233397458-73699.jpg</image:loc>
      <image:title>North Korea’s Lazarus Group Behind the Axios npm Supply Chain Attack</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248080/</loc>
    <image:image>
      <image:loc>https://shimiscyberworld.com/assets/images/feed/telegram-1323386230-248080.jpg</image:loc>
      <image:title>Google Addresses Vertex Security Issues After Researchers Weaponize AI Agent</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248079/</loc>
    <image:image>
      <image:loc>https://shimiscyberworld.com/assets/images/feed/telegram-1323386230-248079.jpg</image:loc>
      <image:title>Free VPNs leak your data while claiming privacy</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1427288221-8702/</loc>
    <image:image>
      <image:loc>https://shimiscyberworld.com/assets/images/feed/telegram-1427288221-8702.jpg</image:loc>
      <image:title>קבוצת ShinyHunters לוקחת אחריות על הפריצה ל-Cisco.</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1542954397-4470/</loc>
    <image:image>
      <image:loc>https://shimiscyberworld.com/assets/images/feed/telegram-1542954397-4470.jpg</image:loc>
      <image:title>חוקר שמפרסם כבר תקופה חשיפות על שחקני סייבר, טוען שעכשיו הוא זיהה 14 משתתפים של Handala - כולל…</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1233397458-73697/</loc>
    <image:image>
      <image:loc>https://shimiscyberworld.com/assets/images/feed/telegram-1233397458-73697.jpg</image:loc>
      <image:title>Hacked, Leaked, Public—What the Kash Patel Email Hack Is Really About</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248078/</loc>
    <image:image>
      <image:loc>https://shimiscyberworld.com/assets/images/feed/telegram-1323386230-248078.jpg</image:loc>
      <image:title>Google Drive ransomware detection now on by default for paying users</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1707304340-2239/</loc>
    <image:image>
      <image:loc>https://shimiscyberworld.com/assets/images/feed/telegram-1707304340-2239.jpg</image:loc>
      <image:title>תקלה ב־Data Center של בית החולים Charité בברלין</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248076/</loc>
    <image:image>
      <image:loc>https://shimiscyberworld.com/assets/images/feed/telegram-1323386230-248076.jpg</image:loc>
      <image:title>A laughing RAT: CrystalX combines spyware, stealer, and prankware features</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248075/</loc>
    <image:image>
      <image:loc>https://shimiscyberworld.com/assets/images/feed/telegram-1323386230-248075.jpg</image:loc>
      <image:title>New Windows 11 emergency update fixes preview update install issues</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1129491012-157521/</loc>
    <image:image>
      <image:loc>https://shimiscyberworld.com/assets/images/feed/telegram-1129491012-157521.jpg</image:loc>
      <image:title>CVE-2026-3776 — The application does not validate the presence of required appearance (AP) data…</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248072/</loc>
    <image:image>
      <image:loc>https://shimiscyberworld.com/assets/images/feed/telegram-1323386230-248072.jpg</image:loc>
      <image:title>83 Million Downloads ft. The Axios Attack - Feedly Threat Intelligence</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248071/</loc>
    <image:image>
      <image:loc>https://www.bleepstatic.com/content/hl-images/2026/02/13/ClaudeAI.png</image:loc>
      <image:title>Claude Code source code accidentally leaked in NPM package</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248070/</loc>
    <image:image>
      <image:loc>https://shimiscyberworld.com/assets/images/feed/telegram-1323386230-248070.jpg</image:loc>
      <image:title>White House executive order purports to limit mail-in voting, mandate federal voter lists</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248069/</loc>
    <image:image>
      <image:loc>https://shimiscyberworld.com/assets/images/feed/telegram-1323386230-248069.jpg</image:loc>
      <image:title>Google now allows you to change your @gmail.com address</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248067/</loc>
    <image:image>
      <image:loc>https://shimiscyberworld.com/assets/images/feed/telegram-1323386230-248067.jpg</image:loc>
      <image:title>Industrialist Pawan Ruia arrested by Bengal police in 315 crore cyber fraud</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248065/</loc>
    <image:image>
      <image:loc>https://shimiscyberworld.com/assets/images/feed/telegram-1323386230-248065.jpg</image:loc>
      <image:title>Proton launches new &quot;Meet&quot; privacy-focused conferencing platform</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1427288221-8701/</loc>
    <image:image>
      <image:loc>https://shimiscyberworld.com/assets/images/feed/telegram-1427288221-8701.jpg</image:loc>
      <image:title>סליחה על השעה וזה אבל נראה שהסיפור עם TeamPCP הולך ומסתבך....</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1129491012-157492/</loc>
    <image:image>
      <image:loc>https://shimiscyberworld.com/assets/images/feed/telegram-1129491012-157492.jpg</image:loc>
      <image:title>CVE-2026-33438 — Stirling-PDF is a locally hosted web application that allows you to perform…</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248063/</loc>
    <image:image>
      <image:loc>https://www.bleepstatic.com/content/hl-images/2026/03/31/vim.jpg</image:loc>
      <image:title>Claude AI finds Vim, Emacs RCE bugs that trigger on file open</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248062/</loc>
    <image:image>
      <image:loc>https://shimiscyberworld.com/assets/images/feed/telegram-1323386230-248062.jpg</image:loc>
      <image:title>The Real Risk of Vibecoding</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1343375789-111437/</loc>
    <image:image>
      <image:loc>https://shimiscyberworld.com/assets/images/feed/telegram-1343375789-111437.jpg</image:loc>
      <image:title>[QILIN] - Ransomware Victim: Service Star Freightways -</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1343375789-111436/</loc>
    <image:image>
      <image:loc>https://shimiscyberworld.com/assets/images/feed/telegram-1343375789-111436.jpg</image:loc>
      <image:title>[QILIN] - Ransomware Victim: Seeing Machines -</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1343375789-111435/</loc>
    <image:image>
      <image:loc>https://shimiscyberworld.com/assets/images/feed/telegram-1343375789-111435.jpg</image:loc>
      <image:title>[QILIN] - Ransomware Victim: SERAM SpA -</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248060/</loc>
    <image:image>
      <image:loc>https://media.assettype.com/freepressjournal/2026-03-31/7t0izt1q/Untitled-design-39.jpg</image:loc>
      <image:title>Mumbai Judge Falls Victim To Cyber Fraud After Fake Customer Care App Drains ₹93,000 From Bank…</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1500098925-269/</loc>
    <image:image>
      <image:loc>https://shimiscyberworld.com/assets/images/feed/telegram-1500098925-269.jpg</image:loc>
      <image:title>Claude Code&apos;s Entire Source Code Was Just Leaked via npm Source Maps — Here&apos;s What&apos;s Inside</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1129491012-157476/</loc>
    <image:image>
      <image:loc>https://shimiscyberworld.com/assets/images/feed/telegram-1129491012-157476.jpg</image:loc>
      <image:title>CVE-2026-33045 — Home Assistant is open source home automation software that puts local control…</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248058/</loc>
    <image:image>
      <image:loc>https://shimiscyberworld.com/assets/images/feed/telegram-1323386230-248058.jpg</image:loc>
      <image:title>TeamPCP Breaches Cloud, SaaS Instances With Stolen Credentials</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248057/</loc>
    <image:image>
      <image:loc>https://shimiscyberworld.com/assets/images/feed/telegram-1323386230-248057.jpg</image:loc>
      <image:title>Asking AI for personal advice is a bad idea, Stanford study shows</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1633659700-18358/</loc>
    <image:image>
      <image:loc>https://shimiscyberworld.com/assets/images/feed/telegram-1633659700-18358.jpg</image:loc>
      <image:title>USA Iran — U.S. Secretary of Defense Pete Hegseth stated that the upcoming days in the war against…</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1343375789-111434/</loc>
    <image:image>
      <image:loc>https://shimiscyberworld.com/assets/images/feed/telegram-1343375789-111434.jpg</image:loc>
      <image:title>CVE Alert: CVE-2026-33577 - OpenClaw - OpenClaw -</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1343375789-111433/</loc>
    <image:image>
      <image:loc>https://shimiscyberworld.com/assets/images/feed/telegram-1343375789-111433.jpg</image:loc>
      <image:title>CVE Alert: CVE-2026-4267 - johnbillion - Query Monitor – The developer tools panel for WordPress -</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1343375789-111432/</loc>
    <image:image>
      <image:loc>https://shimiscyberworld.com/assets/images/feed/telegram-1343375789-111432.jpg</image:loc>
      <image:title>CVE Alert: CVE-2026-32920 - OpenClaw - OpenClaw -</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1343375789-111431/</loc>
    <image:image>
      <image:loc>https://shimiscyberworld.com/assets/images/feed/telegram-1343375789-111431.jpg</image:loc>
      <image:title>CVE Alert: CVE-2026-5198 - code-projects - Student Membership System -</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248055/</loc>
    <image:image>
      <image:loc>https://shimiscyberworld.com/assets/images/feed/telegram-1323386230-248055.jpg</image:loc>
      <image:title>Bengal Police arrest industrialist Pawan Ruia in multi-crore cyber fraud case</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1944023436-71353/</loc>
    <image:image>
      <image:loc>https://shimiscyberworld.com/assets/images/feed/telegram-1944023436-71353.jpg</image:loc>
      <image:title>⭕️ Feeds: New post in Help Net Security: Crypto industry may be running out of time to prepare for…</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1944023436-71352/</loc>
    <image:image>
      <image:loc>https://shimiscyberworld.com/assets/images/feed/telegram-1944023436-71352.jpg</image:loc>
      <image:title>⭕️ Feeds: New post in Security Archives - TechRepublic: Google Drive Expands AI Ransomware…</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1129491012-157449/</loc>
    <image:image>
      <image:loc>https://shimiscyberworld.com/assets/images/feed/telegram-1129491012-157449.jpg</image:loc>
      <image:title>CVE-2026-27876 — A chained attack via SQL Expressions and a Grafana Enterprise plugin can lead…</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248053/</loc>
    <image:image>
      <image:loc>https://shimiscyberworld.com/assets/images/feed/telegram-1323386230-248053.jpg</image:loc>
      <image:title>Attackers hijack Axios npm account to spread RAT malware</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1542954397-4469/</loc>
    <image:image>
      <image:loc>https://shimiscyberworld.com/assets/images/feed/telegram-1542954397-4469.jpg</image:loc>
      <image:title>אם אתם על GitHub Copilot ב-Free, Pro או Pro+, שווה לבדוק הגדרות ⚠️</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1182568527-8599/</loc>
    <image:image>
      <image:loc>https://shimiscyberworld.com/assets/images/feed/telegram-1182568527-8599.jpg</image:loc>
      <image:title>1. This isn&apos;t fake. — 2. Credentials are stored as hashes. It should be literally, with no…</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1009650918-8712/</loc>
    <image:image>
      <image:loc>https://shimiscyberworld.com/assets/images/feed/telegram-1009650918-8712.jpg</image:loc>
      <image:title>Google has opened Android verification to all developers.</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1129491012-157445/</loc>
    <image:image>
      <image:loc>https://shimiscyberworld.com/assets/images/feed/telegram-1129491012-157445.jpg</image:loc>
      <image:title>CVE-2026-30574 — A Business Logic vulnerability exists in SourceCodester Pharmacy Product…</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1129491012-157441/</loc>
    <image:image>
      <image:loc>https://shimiscyberworld.com/assets/images/feed/telegram-1129491012-157441.jpg</image:loc>
      <image:title>CVE-2025-15615 — Wazuh Manager authd service in wazuh-manager packages through version 4.7.3…</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1094744974-24359/</loc>
    <image:image>
      <image:loc>https://shimiscyberworld.com/assets/images/feed/telegram-1094744974-24359.jpg</image:loc>
      <image:title>Cisco source code stolen in Trivy-linked dev environment breach</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1182568527-8597/</loc>
    <image:image>
      <image:loc>https://shimiscyberworld.com/assets/images/feed/telegram-1182568527-8597.jpg</image:loc>
      <image:title>Big shenanigans on the internet today as Threat Researchers speperhypothulate that the Threat Actor…</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1182568527-8596/</loc>
    <image:image>
      <image:loc>https://shimiscyberworld.com/assets/images/feed/telegram-1182568527-8596.jpg</image:loc>
      <image:title>Here is another one of my reactions (I was in bed)</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1182568527-8595/</loc>
    <image:image>
      <image:loc>https://shimiscyberworld.com/assets/images/feed/telegram-1182568527-8595.jpg</image:loc>
      <image:title>Hello to all my Telegram friends who messaged me about Axios supply chain attack.</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1373735086-4945/</loc>
    <image:image>
      <image:loc>https://shimiscyberworld.com/assets/images/feed/telegram-1373735086-4945.jpg</image:loc>
      <image:title>Darkfeed Weekly: 115K User Data Leak and Critical Darknet Events</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1343375789-111424/</loc>
    <image:image>
      <image:loc>https://shimiscyberworld.com/assets/images/feed/telegram-1343375789-111424.jpg</image:loc>
      <image:title>HackerOne Bug Bounty Disclosure: unbounded-gzip-decompression-leading-to-event-loop-starvation-ok-y…</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1542954397-4468/</loc>
    <image:image>
      <image:loc>https://shimiscyberworld.com/assets/images/feed/telegram-1542954397-4468.jpg</image:loc>
      <image:title>סם אלטמן ניפח את שוק הזיכרון ואז נתן לו להוציא אוויר 😮💨</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1233397458-73693/</loc>
    <image:image>
      <image:loc>https://shimiscyberworld.com/assets/images/feed/telegram-1233397458-73693.jpg</image:loc>
      <image:title>VRP 2025 Year in Review</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1233397458-73692/</loc>
    <image:image>
      <image:loc>https://shimiscyberworld.com/assets/images/feed/telegram-1233397458-73692.jpg</image:loc>
      <image:title>Applying security fundamentals to AI: Practical advice for CISOs</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1182568527-8593/</loc>
    <image:image>
      <image:loc>https://shimiscyberworld.com/assets/images/feed/telegram-1182568527-8593.jpg</image:loc>
      <image:title>Dawg, I saw some stinky nerds discussing this recently identified malicious NPM package</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1343375789-111423/</loc>
    <image:image>
      <image:loc>https://shimiscyberworld.com/assets/images/feed/telegram-1343375789-111423.jpg</image:loc>
      <image:title>[GENESIS] - Ransomware Victim: HMI Elements -</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1343375789-111422/</loc>
    <image:image>
      <image:loc>https://shimiscyberworld.com/assets/images/feed/telegram-1343375789-111422.jpg</image:loc>
      <image:title>[GENESIS] - Ransomware Victim: Green Giftz -</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1343375789-111421/</loc>
    <image:image>
      <image:loc>https://shimiscyberworld.com/assets/images/feed/telegram-1343375789-111421.jpg</image:loc>
      <image:title>[WORLDLEAKS] - Ransomware Victim: San Felipe Del Rio CISD School -</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1343375789-111420/</loc>
    <image:image>
      <image:loc>https://shimiscyberworld.com/assets/images/feed/telegram-1343375789-111420.jpg</image:loc>
      <image:title>[GENESIS] - Ransomware Victim: Raphael Ortho -</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1343375789-111419/</loc>
    <image:image>
      <image:loc>https://shimiscyberworld.com/assets/images/feed/telegram-1343375789-111419.jpg</image:loc>
      <image:title>[GENESIS] - Ransomware Victim: Secure Health -</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1343375789-111418/</loc>
    <image:image>
      <image:loc>https://shimiscyberworld.com/assets/images/feed/telegram-1343375789-111418.jpg</image:loc>
      <image:title>[GENESIS] - Ransomware Victim: B&amp;R Sheet Metal -</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1633659700-18357/</loc>
    <image:image>
      <image:loc>https://cdn4.telesco.pe/file/Yy8J2o2hIaWw85XlvhQsHHmKckKKTuBnQSZ4J0SrlmrGB8N-Zc3trF9hBm5a9RMX2_pxMuCXJ9rWyJZchkpYnsyg32xfpbJ3HBNdQkXSMDoWXAPqcXuu5C2B58lFBVZuNfdywhZM-GNgER1aE3FNGwtWY-WOy8cs9IW6cFwPQ2YH_MnjEre0PtTLLDQ-Hy_Jvp7by2_keznyDPGBziMLbERvWfBgE0mmMGUrpzHHTk1pMtbsBjI605mb7WZWk1qJ1X7N3TAVBt7fhCPaqCSvpCFf_7Jg0WV5G8NbJ2cQUm27BdHO2_kC_5ULoltVq9I_LOAYZaWD7BDu3hXYA9MkJQ.jpg</image:loc>
      <image:title>USA Russia — Asymmetrical warfare is becoming the norm, allowing smaller, non-state actors to…</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248047/</loc>
    <image:image>
      <image:loc>https://shimiscyberworld.com/assets/images/feed/telegram-1323386230-248047.jpg</image:loc>
      <image:title>F5 BIG-IP Vulnerability Reclassified as RCE, Under Exploitation</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1129491012-157427/</loc>
    <image:image>
      <image:loc>https://opengraph.githubassets.com/0ae2b026a8efd9d1c1043532330843a6ba4dce7d963f9e031a724eabc36affb9/WWBN/AVideo/commit/5fcb3bdf59f26d65e203cfbc8a685356ba300b60</image:loc>
      <image:title>CVE-2026-34247 — WWBN AVideo is an open source video platform. In versions up to and including…</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1633659700-18356/</loc>
    <image:image>
      <image:loc>https://cdn4.telesco.pe/file/Yy8J2o2hIaWw85XlvhQsHHmKckKKTuBnQSZ4J0SrlmrGB8N-Zc3trF9hBm5a9RMX2_pxMuCXJ9rWyJZchkpYnsyg32xfpbJ3HBNdQkXSMDoWXAPqcXuu5C2B58lFBVZuNfdywhZM-GNgER1aE3FNGwtWY-WOy8cs9IW6cFwPQ2YH_MnjEre0PtTLLDQ-Hy_Jvp7by2_keznyDPGBziMLbERvWfBgE0mmMGUrpzHHTk1pMtbsBjI605mb7WZWk1qJ1X7N3TAVBt7fhCPaqCSvpCFf_7Jg0WV5G8NbJ2cQUm27BdHO2_kC_5ULoltVq9I_LOAYZaWD7BDu3hXYA9MkJQ.jpg</image:loc>
      <image:title>Iraq — Raytheon&apos;s Coyote drones use non-kinetic methods to intercept and defeat enemy drones,…</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1633659700-18355/</loc>
    <image:image>
      <image:loc>https://shimiscyberworld.com/assets/images/feed/telegram-1633659700-18355.jpg</image:loc>
      <image:title>Ukraine Russia — Ukraine has intensified long-range drone strikes on Russian energy infrastructure…</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1633659700-18354/</loc>
    <image:image>
      <image:loc>https://shimiscyberworld.com/assets/images/feed/telegram-1633659700-18354.jpg</image:loc>
      <image:title>Lebanon Israel — Israel will maintain a &quot;safe zone&quot; in southern Lebanon until the threat from…</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1633659700-18353/</loc>
    <image:image>
      <image:loc>https://shimiscyberworld.com/assets/images/feed/telegram-1633659700-18353.jpg</image:loc>
      <image:title>China ME — China has studied strategies and weapons in the conflict in the Middle East, which in…</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248044/</loc>
    <image:image>
      <image:loc>https://shimiscyberworld.com/assets/images/feed/telegram-1323386230-248044.jpg</image:loc>
      <image:title>Iran Deploys &apos;Pseudo-Ransomware,&apos; Revives Pay2Key Operations</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248043/</loc>
    <image:image>
      <image:loc>https://shimiscyberworld.com/assets/images/feed/telegram-1323386230-248043.jpg</image:loc>
      <image:title>Attack on axios software developer tool threatens widespread compromises</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1129491012-157419/</loc>
    <image:image>
      <image:loc>https://shimiscyberworld.com/assets/images/feed/telegram-1129491012-157419.jpg</image:loc>
      <image:title>CVE-2026-33622 — PinchTab is a standalone HTTP server that gives AI agents direct control over a…</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1633659700-18352/</loc>
    <image:image>
      <image:loc>https://shimiscyberworld.com/assets/images/feed/telegram-1633659700-18352.jpg</image:loc>
      <image:title>EU USA ME — Europe and the U.S. have struggled to adapt their military strategies and arms…</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1009650918-8711/</loc>
    <image:image>
      <image:loc>https://shimiscyberworld.com/assets/images/feed/telegram-1009650918-8711.jpg</image:loc>
      <image:title>A zero-day in TrueConf let attackers spread malware through its own update system.</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248042/</loc>
    <image:image>
      <image:loc>https://shimiscyberworld.com/assets/images/feed/telegram-1323386230-248042.jpg</image:loc>
      <image:title>Censys Raises $70 Million for Internet Intelligence Platform</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1233397458-73689/</loc>
    <image:image>
      <image:loc>https://shimiscyberworld.com/assets/images/feed/telegram-1233397458-73689.jpg</image:loc>
      <image:title>Why ransomware is now after your data — and how to protect your home storage | Kaspersky official…</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248041/</loc>
    <image:image>
      <image:loc>https://shimiscyberworld.com/assets/images/feed/telegram-1323386230-248041.jpg</image:loc>
      <image:title>Rethinking Vulnerability Management Strategies for Mid-Market Security</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248040/</loc>
    <image:image>
      <image:loc>https://shimiscyberworld.com/assets/images/feed/telegram-1323386230-248040.jpg</image:loc>
      <image:title>AI and Quantum Are Forcing a Rethink of Digital Trust</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248039/</loc>
    <image:image>
      <image:loc>https://shimiscyberworld.com/assets/images/feed/telegram-1323386230-248039.jpg</image:loc>
      <image:title>The Next Cybersecurity Crisis Isn’t Breaches—It’s Data You Can’t Trust</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1633659700-18351/</loc>
    <image:image>
      <image:loc>https://shimiscyberworld.com/assets/images/feed/telegram-1633659700-18351.jpg</image:loc>
      <image:title>Poland USA ME — Poland has refused to transfer its Patriot missile system to the U.S. for…</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248038/</loc>
    <image:image>
      <image:loc>https://shimiscyberworld.com/assets/images/feed/telegram-1323386230-248038.jpg</image:loc>
      <image:title>AI-Driven Code Surge Is Forcing a Rethink of AppSec</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1129491012-157412/</loc>
    <image:image>
      <image:loc>https://shimiscyberworld.com/assets/images/feed/telegram-1129491012-157412.jpg</image:loc>
      <image:title>CVE-2026-34557 — CI4MS is a CodeIgniter 4-based CMS skeleton that delivers a production-ready,…</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1129491012-157408/</loc>
    <image:image>
      <image:loc>https://shimiscyberworld.com/assets/images/feed/telegram-1129491012-157408.jpg</image:loc>
      <image:title>CVE-2026-21710 — A flaw in Node.js HTTP request handling causes an uncaught TypeError when a…</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1009650918-8710/</loc>
    <image:image>
      <image:loc>https://shimiscyberworld.com/assets/images/feed/telegram-1009650918-8710.jpg</image:loc>
      <image:title>AI is redefining cyber roles, hiring, and skills.</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248037/</loc>
    <image:image>
      <image:loc>https://shimiscyberworld.com/assets/images/feed/telegram-1323386230-248037.jpg</image:loc>
      <image:title>Stolen Logins Are Fueling Everything From Ransomware to Nation-State Cyberattacks</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248036/</loc>
    <image:image>
      <image:loc>https://shimiscyberworld.com/assets/images/feed/telegram-1323386230-248036.jpg</image:loc>
      <image:title>Axios supply chain attack chops away at npm trust</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1129491012-157399/</loc>
    <image:image>
      <image:loc>https://shimiscyberworld.com/assets/images/feed/telegram-1129491012-157399.jpg</image:loc>
      <image:title>CVE-2026-29044 — EVerest is an EV charging software stack. Prior to version 2026.02.0, when…</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248034/</loc>
    <image:image>
      <image:loc>https://shimiscyberworld.com/assets/images/feed/telegram-1323386230-248034.jpg</image:loc>
      <image:title>WhatsApp malware campaign delivers VBS payloads and MSI backdoors</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248033/</loc>
    <image:image>
      <image:loc>https://shimiscyberworld.com/assets/images/feed/telegram-1323386230-248033.jpg</image:loc>
      <image:title>Nearly half a Million mobile customers of Lloyds Banking Group affected by security incident</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248032/</loc>
    <image:image>
      <image:loc>https://shimiscyberworld.com/assets/images/feed/telegram-1323386230-248032.jpg</image:loc>
      <image:title>Bank staff must act swiftly to prevent cyber fraud, says Hyderabad Police Commissioner</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248031/</loc>
    <image:image>
      <image:loc>https://shimiscyberworld.com/assets/images/feed/telegram-1323386230-248031.jpg</image:loc>
      <image:title>How to Categorize AI Agents and Prioritize Risk</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248030/</loc>
    <image:image>
      <image:loc>https://shimiscyberworld.com/assets/images/feed/telegram-1323386230-248030.jpg</image:loc>
      <image:title>The Invisible Attack Surface: 10 Fraud Signals Every WordPress Developer Misses</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248029/</loc>
    <image:image>
      <image:loc>https://shimiscyberworld.com/assets/images/feed/telegram-1323386230-248029.jpg</image:loc>
      <image:title>TeamPCP Moves From OSS to AWS Environments</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248028/</loc>
    <image:image>
      <image:loc>https://shimiscyberworld.com/assets/images/feed/telegram-1323386230-248028.jpg</image:loc>
      <image:title>Hackers compromise Axios npm package to drop cross-platform malware</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248026/</loc>
    <image:image>
      <image:loc>https://shimiscyberworld.com/assets/images/feed/telegram-1323386230-248026.jpg</image:loc>
      <image:title>Axios Supply Chain Attack: A New Wave of Cross-Platform RAT Malware</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248025/</loc>
    <image:image>
      <image:loc>https://shimiscyberworld.com/assets/images/feed/telegram-1323386230-248025.jpg</image:loc>
      <image:title>CrewAI Vulnerabilities Expose Devices to Hacking</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1633659700-18350/</loc>
    <image:image>
      <image:loc>https://shimiscyberworld.com/assets/images/feed/telegram-1633659700-18350.jpg</image:loc>
      <image:title>Italy USA ME — Italy has denied permission for U.S. military aircraft to land at the Sigonella air…</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1707304340-2238/</loc>
    <image:image>
      <image:loc>https://cdn4.telesco.pe/file/lWsaH8vVHsFuYIPfeDMasTiDtoS2UNRJuaXLi0tfZkE0wMDnOdlzBjfRx8tSCNtjMdhCBJA15CmzIEeOJhJDmK3DpK4f50RHp_XmkqSrHSFL1lg6n2-HH0RHzCWdox9O7JwAKMFBPIvPefKU1wxubFGog_8cAGrKseOGHjTGJmWp2zj-jk_wsqDowOi8YEotFA-K-Zr_KBld3tcfNE-u8Zmx8CEAbYmHSC0QqgTxhgzIB2fEn1WUrowtibiYfJHzFDVeswpG6HK40imO3L3VK-dciiRnOQbMQnJgftUTKlM3CW1OmPGhSXHAGM-Lk5GckK1bHZ_CttyzYEvXF39oYA.jpg</image:loc>
      <image:title>פדיחת npm ב־Anthropic חושפת את מאחורי הקלעים של Claude Code</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248024/</loc>
    <image:image>
      <image:loc>https://shimiscyberworld.com/assets/images/feed/telegram-1323386230-248024.jpg</image:loc>
      <image:title>Operation TrueChaos: 0-Day Exploitation Against Southeast Asian Government Targets</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248023/</loc>
    <image:image>
      <image:loc>https://shimiscyberworld.com/assets/images/feed/telegram-1323386230-248023.jpg</image:loc>
      <image:title>Axios npm supply chain attack: Malicious updates add remote access trojan</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1542954397-4467/</loc>
    <image:image>
      <image:loc>https://shimiscyberworld.com/assets/images/feed/telegram-1542954397-4467.jpg</image:loc>
      <image:title>עוד מכה בשרשרת האספקה, הפעם על Axios 🎯</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1009650918-8709/</loc>
    <image:image>
      <image:loc>https://shimiscyberworld.com/assets/images/feed/telegram-1009650918-8709.jpg</image:loc>
      <image:title>AI is shrinking cyberattacks to hours.</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248022/</loc>
    <image:image>
      <image:loc>https://www.cycognito.com/blog/wp-content/uploads/Axios-npm-RAT-vuln.png</image:loc>
      <image:title>Emerging Threat: axios npm Supply Chain Attack Drops Remote Access Trojan</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1009650918-8708/</loc>
    <image:image>
      <image:loc>https://shimiscyberworld.com/assets/images/feed/telegram-1009650918-8708.jpg</image:loc>
      <image:title>A flaw in Google Cloud Vertex AI could expose sensitive data across projects.</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1094744974-24356/</loc>
    <image:image>
      <image:loc>https://shimiscyberworld.com/assets/images/feed/telegram-1094744974-24356.jpg</image:loc>
      <image:title>Microsoft fixes Outlook Classic crashes caused by Teams Meeting add-in</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1633659700-18347/</loc>
    <image:image>
      <image:loc>https://shimiscyberworld.com/assets/images/feed/telegram-1633659700-18347.jpg</image:loc>
      <image:title>Israel France — France refused to allow Israeli planes to use its airspace for military supplies.…</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1009650918-8707/</loc>
    <image:image>
      <image:loc>https://shimiscyberworld.com/assets/images/feed/telegram-1009650918-8707.jpg</image:loc>
      <image:title>Silver Fox is spreading AtlasCross RAT via fake Zoom, Signal, and Teams sites.</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/incd-alert_1986/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1573164713988-8665fc963095?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Password Spray Attacks Target Microsoft 365 in Israel</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/incd-alert_1985/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1558494949-ef010cbdcc31?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Supply Chain Attack Targets NPM Packages, INCD Warns</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1009650918-8706/</loc>
    <image:image>
      <image:loc>https://shimiscyberworld.com/assets/images/feed/telegram-1009650918-8706.jpg</image:loc>
      <image:title>Most AppSec teams say they fix critical bugs. Data shows otherwise.</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1373735086-4944/</loc>
    <image:image>
      <image:loc>https://cdn4.telesco.pe/file/Qet9AAiuJ32yuDm4qcJ2i5qdxsRTlygiYX2KlvjTWN-gQKK_iQ4esiC-sdD3nHFjgoZuvgPd_G5HvmjV0Wdrco8BdKWNgjtiVfPUWANa3JMsE9-nxhP2EiW-OtdvTVgFoeE5BNQ6R6fZpdTmXsK_MFGrpIpeF2MofnpIt3-v_5SKb0Xa914yfQpZmmGWjgj-400mJ-PWhfS-JZIoVZr-T94-Xldll7Dg73ly6tUjztP7ObXIERziCHAveRLAPD0ufv2dYcllMxAgZVI0XG8xB42v_Y9Qsq5RiCCjwXivMhjFY-OxjT2h7BjUtsSO1xjLOTQOp157j4fvoKNyvzl7mw.jpg</image:loc>
      <image:title>New Event Detected!</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248006/</loc>
    <image:image>
      <image:loc>https://securityaffairs.com/wp-content/uploads/2020/07/CISA.jpeg</image:loc>
      <image:title>U.S. CISA adds a flaw in Citrix NetScaler to its Known Exploited Vulnerabilities catalog</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1094744974-24355/</loc>
    <image:image>
      <image:loc>https://shimiscyberworld.com/assets/images/feed/telegram-1094744974-24355.jpg</image:loc>
      <image:title>Hacker charged with stealing $53 million from Uranium crypto exchange</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1633659700-18346/</loc>
    <image:image>
      <image:loc>https://shimiscyberworld.com/assets/images/feed/telegram-1633659700-18346.jpg</image:loc>
      <image:title>Iran Russia China NK</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248003/</loc>
    <image:image>
      <image:loc>https://thecyberexpress.com/wp-content/uploads/Axios-supply-chain-attack.webp</image:loc>
      <image:title>Axios Supply Chain Attack Exposes Developers to Hidden Malware</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1373735086-4943/</loc>
    <image:image>
      <image:loc>https://darkfeed.io/wp-content/uploads/2023/05/cropped-LOGO-BLACK-BACKGROUND.jpg</image:loc>
      <image:title>Top Targeted Sectors — March (MTD)</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1094744974-24354/</loc>
    <image:image>
      <image:loc>https://shimiscyberworld.com/assets/images/feed/telegram-1094744974-24354.jpg</image:loc>
      <image:title>Dutch Finance Ministry takes treasury banking portal offline after breach</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-248001/</loc>
    <image:image>
      <image:loc>https://securityaffairs.com/wp-content/uploads/2026/03/image-94.png</image:loc>
      <image:title>Qilin Ransomware allegedly breached chemical manufacturer giant Dow Inc</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1633659700-18345/</loc>
    <image:image>
      <image:loc>https://shimiscyberworld.com/assets/images/feed/telegram-1633659700-18345.jpg</image:loc>
      <image:title>USA EU — Secretary Rubio criticized NATO for denying the US access to military bases during the…</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1323386230-247999/</loc>
    <image:image>
      <image:loc>https://blogapp.bitdefender.com/hotforsecurity/content/images/2026/03/kash-patel.jpeg</image:loc>
      <image:title>Iranian hackers breach FBI director’s personal email, and post his CV and photos online</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1094744974-24353/</loc>
    <image:image>
      <image:loc>https://shimiscyberworld.com/assets/images/feed/telegram-1094744974-24353.jpg</image:loc>
      <image:title>CISA orders feds to patch actively exploited Citrix flaw by Thursday</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1233397458-73678/</loc>
    <image:image>
      <image:loc>https://thecyberexpress.com/wp-content/uploads/Intesa-Sanpaolo-data-breach.webp</image:loc>
      <image:title>Intesa Sanpaolo Data Breach Exposes 3,500+ Customers, Draws €31.8M Penalty</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1427288221-8698/</loc>
    <image:image>
      <image:loc>https://cdn4.telesco.pe/file/AlN-htvRK3jIdvSFG5S-anZgGCI50UChZF_JoqHFV3poFugtRKciN74_GcEkFNFr4NaC_t6eIJ5s0OeGvlT6mFZcOHLt1MDv1rT-c43Ep4od5zmPn1N5n3cSb7q4GEw5b0_9VQcu5cBmVkCxh579VbIZInIkayK4Xo2j0cQRBgjoeutT16Ew2WZAKadCfvD_C1MUfHlb2k0rGoSibKfoZT8W2_0Z0Brk6n-uDpNvMgeajUh93rpjLrG_g8iLjv9xiAI-wewtnJ0-dTX6qBL0kOZE657dyYiIuYU3ORmW_F_pnsRYuVKfgUOJLyl1NfQXmM3neC0CKW0nx8_Q3pkI5g.jpg</image:loc>
      <image:title>קיבלתם עשרות הודעות עם קוד אימות (OTP) בלי שביקשתם?</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1633659700-18344/</loc>
    <image:image>
      <image:loc>https://shimiscyberworld.com/assets/images/feed/telegram-1633659700-18344.jpg</image:loc>
      <image:title>Iran — The material in question is likely highly enriched uranium (HEU), with estimates suggesting…</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1009650918-8705/</loc>
    <image:image>
      <image:loc>https://shimiscyberworld.com/assets/images/feed/telegram-1009650918-8705.jpg</image:loc>
      <image:title>WARNING - Axios npm (83M weekly downloads) was compromised, turning installs into a malware…</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1542954397-4465/</loc>
    <image:image>
      <image:loc>https://www.internetgovernance.org/wp-content/uploads/1545187481-huge-002.jpg</image:loc>
      <image:title>בארה&quot;ב מתלוננים על האיסור על ראוטרים סינים שלא באמת פותר בעיית סייבר ובעיקר פוליטיקה תעשייתית 😏</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1707304340-2236/</loc>
    <image:image>
      <image:loc>https://cdn4.telesco.pe/file/F_RaYNfptXjrsfMNZaEoJqZZdCYVfG0z3QFeI0oATnDx4_HKmUcg1_ssBTGSu-9E67auQ9be433opq9D1kaZJEYxLmX6K0HOJUbIrcIDiN79byIQHbox6ucHuFAAIshyruOKdRCIU9cTPI8kNGjnM-aPeEYDtKZPHZc3GnXljOATaUFhURNv6S3tEKGHWBatM29fOtq35RIrXtp5JGrUBekSr7p9iQwVS-swxkXw_KuUKw7gdIjZGno6VfZ36Tr3Hbe7ZWjQAygktM1UK74bwxjP4YR4WnNlqwcSo44E03kTuemIYkXFccwEJeL4YKmfiwHsHEZedMoZOAUUn5DbIA.jpg</image:loc>
      <image:title>קנס של 31.8 מיליון אירו לבנק Intesa Sanpaolo חושף כשל שקט אבל קריטי Insider Threat שלא זוהה בזמן</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1633659700-18343/</loc>
    <image:image>
      <image:loc>https://shimiscyberworld.com/assets/images/feed/telegram-1633659700-18343.jpg</image:loc>
      <image:title>Russia — The Geran-2 drone, originally based on the Iranian Shahed-136 design, is being developed…</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1633659700-18341/</loc>
    <image:image>
      <image:loc>https://shimiscyberworld.com/assets/images/feed/telegram-1633659700-18341.jpg</image:loc>
      <image:title>Jordan — King Abdullah II of Jordan refused multiple requests for a meeting with Israeli Prime…</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1182568527-8592/</loc>
    <image:image>
      <image:loc>https://shimiscyberworld.com/assets/images/feed/telegram-1182568527-8592.jpg</image:loc>
      <image:title>ShinyHunters is ransoming ... HALLMARK CARDS</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1094744974-24352/</loc>
    <image:image>
      <image:loc>https://shimiscyberworld.com/assets/images/feed/telegram-1094744974-24352.jpg</image:loc>
      <image:title>Healthcare tech firm CareCloud says hackers stole patient data</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1094744974-24351/</loc>
    <image:image>
      <image:loc>https://shimiscyberworld.com/assets/images/feed/telegram-1094744974-24351.jpg</image:loc>
      <image:title>New RoadK1ll WebSocket implant used to pivot on breached networks</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1182568527-8589/</loc>
    <image:image>
      <image:loc>https://shimiscyberworld.com/assets/images/feed/telegram-1182568527-8589.jpg</image:loc>
      <image:title>Someone unironically recommended I buy a children&apos;s book on cybersecurity to read to my son.</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1009650918-8704/</loc>
    <image:image>
      <image:loc>https://shimiscyberworld.com/assets/images/feed/telegram-1009650918-8704.jpg</image:loc>
      <image:title>Two OpenAI flaws showed how AI systems can expose sensitive data.</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1633659700-18340/</loc>
    <image:image>
      <image:loc>https://shimiscyberworld.com/assets/images/feed/telegram-1633659700-18340.jpg</image:loc>
      <image:title>USA — The Pentagon warns that depleted weapons stockpiles and limited allied support could increase…</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1233397458-73677/</loc>
    <image:image>
      <image:loc>https://securityaffairs.com/wp-content/uploads/2016/08/telegram.jpg</image:loc>
      <image:title>It’s a mystery … alleged unpatched Telegram zero-day allows device takeover, but Telegram denies</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1009650918-8703/</loc>
    <image:image>
      <image:loc>https://shimiscyberworld.com/assets/images/feed/telegram-1009650918-8703.jpg</image:loc>
      <image:title>Most Tier 1 delays start before the threat is even understood.</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1009650918-8702/</loc>
    <image:image>
      <image:loc>https://shimiscyberworld.com/assets/images/feed/telegram-1009650918-8702.jpg</image:loc>
      <image:title>A new malware loader is using fake “fix” prompts to trick users into running PowerShell commands.</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1094744974-24349/</loc>
    <image:image>
      <image:loc>https://shimiscyberworld.com/assets/images/feed/telegram-1094744974-24349.jpg</image:loc>
      <image:title>Apple adds macOS Terminal warning to block ClickFix attacks</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1094744974-24348/</loc>
    <image:image>
      <image:loc>https://shimiscyberworld.com/assets/images/feed/telegram-1094744974-24348.jpg</image:loc>
      <image:title>How to Evaluate AI SOC Agents: 7 Questions Gartner Says You Should Be Asking</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1373735086-4941/</loc>
    <image:image>
      <image:loc>https://darkfeed.io/wp-content/uploads/2023/05/cropped-LOGO-BLACK-BACKGROUND.jpg</image:loc>
      <image:title>Last Week&apos;s CyberAttack &amp; Ransomware Insights and Statistics 🎯</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1009650918-8700/</loc>
    <image:image>
      <image:loc>https://shimiscyberworld.com/assets/images/feed/telegram-1009650918-8700.jpg</image:loc>
      <image:title>This week in cybersecurity...</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/incd-alert_1984/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1691435828932-911a7801adfb?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Israel Braces for Annual Activist Cyber Attacks Amidst Regional Tensions</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1094744974-24347/</loc>
    <image:image>
      <image:loc>https://shimiscyberworld.com/assets/images/feed/telegram-1094744974-24347.jpg</image:loc>
      <image:title>Hackers now exploit critical F5 BIG-IP flaw in attacks, patch now</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1094744974-24346/</loc>
    <image:image>
      <image:loc>https://shimiscyberworld.com/assets/images/feed/telegram-1094744974-24346.jpg</image:loc>
      <image:title>Microsoft pulls KB5079391 Windows update over install issues</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1009650918-8698/</loc>
    <image:image>
      <image:loc>https://shimiscyberworld.com/assets/images/feed/telegram-1009650918-8698.jpg</image:loc>
      <image:title>A Russian-linked toolkit is spreading through fake Windows shortcut files disguised as private…</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1597138777-3443/</loc>
    <image:image>
      <image:loc>https://substackcdn.com/image/fetch/$s_!-uTc!,w_1200,h_675,c_fill,f_jpg,q_auto:good,fl_progressive:steep,g_auto/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fefc3cec5-06b6-4303-b213-4d834ac1e31b_1000x1062.png</image:loc>
      <image:title>OSINT of Georgia🇬🇪🇬🇪🇬🇪</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1233397458-73671/</loc>
    <image:image>
      <image:loc>https://thecyberexpress.com/wp-content/uploads/Russian-information-operation.webp</image:loc>
      <image:title>Latvia Warns of Disinformation Campaign Targeting Baltic States</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1009650918-8697/</loc>
    <image:image>
      <image:loc>https://shimiscyberworld.com/assets/images/feed/telegram-1009650918-8697.jpg</image:loc>
      <image:title>AI isn’t making code safer. It’s expanding the attack surface.</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1094744974-24345/</loc>
    <image:image>
      <image:loc>https://shimiscyberworld.com/assets/images/feed/telegram-1094744974-24345.jpg</image:loc>
      <image:title>Critical Fortinet Forticlient EMS flaw now exploited in attacks</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1094744974-24344/</loc>
    <image:image>
      <image:loc>https://shimiscyberworld.com/assets/images/feed/telegram-1094744974-24344.jpg</image:loc>
      <image:title>European Commission confirms data breach after Europa.eu hack</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1009650918-8696/</loc>
    <image:image>
      <image:loc>https://shimiscyberworld.com/assets/images/feed/telegram-1009650918-8696.jpg</image:loc>
      <image:title>Three China-linked clusters targeted a Southeast Asian government in a coordinated operation.</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1182568527-8586/</loc>
    <image:image>
      <image:loc>https://shimiscyberworld.com/assets/images/feed/telegram-1182568527-8586.jpg</image:loc>
      <image:title>It&apos;s funny stuff. When you reside in the United States (and presumably Europe) you always read…</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1182568527-8585/</loc>
    <image:image>
      <image:loc>https://shimiscyberworld.com/assets/images/feed/telegram-1182568527-8585.jpg</image:loc>
      <image:title>vrroooom eagle werewolf</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1094744974-24343/</loc>
    <image:image>
      <image:loc>https://shimiscyberworld.com/assets/images/feed/telegram-1094744974-24343.jpg</image:loc>
      <image:title>FBI confirms hack of Director Patel&apos;s personal email inbox</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1373735086-4939/</loc>
    <image:image>
      <image:loc>https://darkfeed.io/wp-content/uploads/2023/05/cropped-LOGO-BLACK-BACKGROUND.jpg</image:loc>
      <image:title>Top Targeted Countries — March (MTD)</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1955946092-608/</loc>
    <image:image>
      <image:loc>https://cdn.prod.website-files.com/65e2696571877968e11e87f3/69a9754891e339513db44e4c_Infamy%20Complex.%20OSINT%20Fugitive%20Intelligence%20Catches%20Criminals%20Who%20Can%E2%80%99t%20Log%20Off.webp</image:loc>
      <image:title>ARRESTED: How OSINT caught a &quot;master of evasion&quot; in Las Vegas. ⚖️</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1094744974-24342/</loc>
    <image:image>
      <image:loc>https://shimiscyberworld.com/assets/images/feed/telegram-1094744974-24342.jpg</image:loc>
      <image:title>File read flaw in Smart Slider plugin impacts 500K WordPress sites</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1542954397-4460/</loc>
    <image:image>
      <image:loc>https://shimiscyberworld.com/</image:loc>
      <image:title>גוגל זרקה לאוויר את TurboQuant ⚡️</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1542954397-4459/</loc>
    <image:image>
      <image:loc>https://cdn4.telesco.pe/file/jZru-jUDAgPVM_uWiXQEmISbJ4BB_NZaGKRJdh0qckDyq_p0kGdW8xNWQmmtDrLr-JVX6vvpMsuljGIdNmM0UHYFdlkHzbHHld93PHDhgSUoidQfk-SgbE1-ijJr3kFKbED9O67lFMHVOpaEx_yWCypGr5RdVGLXJcYBKNxlqZ9sEiErpM7jDsXalhVFyF1eoKZZulvv8QIPON3fnUEwmKlDuNr7w10Ngmmv4jQnjTBnLNPKJo0cLueFPw_MJw-mcH7v2pxlTdyfrxsd-IFnILR4rMhb4fQ88gJfZnmqMHqaBHqQz52aKfd0jW-aSQWMTeKnRz1lrewkeHx1cLYjbg.jpg</image:loc>
      <image:title>תוסף הכרום של Claude חטף חתיכת מבוכה 😏</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1707304340-2233/</loc>
    <image:image>
      <image:loc>https://cdn4.telesco.pe/file/QoLOgB_0ZwTP7UiSsOgps3UtpG5axOI5SKqeCLNrKRQ_vAEyY5AkNRgA_FAU8W_UnsHE4MVbXk1PWnaUbG9HephqZ9t2P5D60O4ixJvEpQfiuy9jISFZdrBwzVU8vnlbT6xJAbXcw68_vdNOTD5qqJADDJWXNni9pnGgFXPybKODrzoQxC8Lsu-DrvnhQ8C0ZWWvsoKlSWR1SPUbyYEEK5H9mqmedgfd9YSTp2yu6tp6RUW9mAc81z5UJ-MYaNHl3Yow5BKLSuJNWyekouf560sYsI4T-__32TBLizE2WAQkc1e-mGn5acNLSEqjoeqi2YisyIlaEjTjlCGiWWvcdQ.jpg</image:loc>
      <image:title>דליפה ב־Anthropic חושפת דור AI חדש עם השלכות סייבר כבדות</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1542954397-4458/</loc>
    <image:image>
      <image:loc>https://www.bleepstatic.com/content/hl-images/2026/03/27/European_Union_flags.jpg</image:loc>
      <image:title>הנציבות האירופית בודקת פריצה לתשתית הענן שמארחת את פלטפורמת Europa 🔐</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1707304340-2232/</loc>
    <image:image>
      <image:loc>https://cdn4.telesco.pe/file/lWsaH8vVHsFuYIPfeDMasTiDtoS2UNRJuaXLi0tfZkE0wMDnOdlzBjfRx8tSCNtjMdhCBJA15CmzIEeOJhJDmK3DpK4f50RHp_XmkqSrHSFL1lg6n2-HH0RHzCWdox9O7JwAKMFBPIvPefKU1wxubFGog_8cAGrKseOGHjTGJmWp2zj-jk_wsqDowOi8YEotFA-K-Zr_KBld3tcfNE-u8Zmx8CEAbYmHSC0QqgTxhgzIB2fEn1WUrowtibiYfJHzFDVeswpG6HK40imO3L3VK-dciiRnOQbMQnJgftUTKlM3CW1OmPGhSXHAGM-Lk5GckK1bHZ_CttyzYEvXF39oYA.jpg</image:loc>
      <image:title>עדכוני סייבר - סיכום שבת ✨</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1427288221-8684/</loc>
    <image:image>
      <image:loc>https://cdn4.telesco.pe/file/K60f4g3UtJSf32pNMsCzR8AWEpL7D1Ipa83T7DaInATpqiVkFFYVo97goYJkFm3UxmJ_sANM44h5mOmGVjfeLheIrXRf3wmWVdcrV0SupceI6JK3QaGPwPOslOef4cIu1L3xfWjlPIiBYzDb4yBMX30pEXKpMbKFUW-i2SlA1qimp8-eRmS9zwRwLeC2vJej66r76NehGIlkJwJwUbOHtM5HfMQ4KkQ8FxB87PaLm9J835qasR6uUuvsbqCMsC9AyYQrBqdD0JE6oYraeSQ0xhXjJbP5QuRWLnNu5ai_TtrzkTQi2s2gbWglgS0gD3uL_SsmtXySg6e831BW0QsxZA.jpg</image:loc>
      <image:title>סיכום חדשות השבת בסייבר:</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1009650918-8695/</loc>
    <image:image>
      <image:loc>https://shimiscyberworld.com/assets/images/feed/telegram-1009650918-8695.jpg</image:loc>
      <image:title>Iran-linked hackers breached FBI Director Kash Patel’s personal email and leaked years-old data.</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1094744974-24341/</loc>
    <image:image>
      <image:loc>https://shimiscyberworld.com/assets/images/feed/telegram-1094744974-24341.jpg</image:loc>
      <image:title>New Infinity Stealer malware grabs macOS data via ClickFix lures</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1373735086-4937/</loc>
    <image:image>
      <image:loc>https://darkfeed.io/wp-content/uploads/2023/05/cropped-LOGO-BLACK-BACKGROUND.jpg</image:loc>
      <image:title>Tracking the pulse of ransomware in 2026—these are the groups leading the global attack…</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1955946092-607/</loc>
    <image:image>
      <image:loc>https://cdn.prod.website-files.com/65e2696571877968e11e87f3/69c5967f2319da062436ecd6_OSINT%20AI.%205%20Ways%20AI%20Will%20Transform%20Your%20Open%20Source%20Intelligence%20Investigation%E2%80%8D.webp</image:loc>
      <image:title>5 Ways AI Will Transform Your OSINT Investigations 🔎</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1597138777-3441/</loc>
    <image:image>
      <image:loc>https://substackcdn.com/image/fetch/$s_!Jjc9!,w_1200,h_675,c_fill,f_jpg,q_auto:good,fl_progressive:steep,g_auto/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5e7fbd89-7c98-4395-84d0-74d99e285c68_1800x1024.heic</image:loc>
      <image:title>OSINT Practice Platforms</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1009650918-8694/</loc>
    <image:image>
      <image:loc>https://shimiscyberworld.com/assets/images/feed/telegram-1009650918-8694.jpg</image:loc>
      <image:title>Attackers are probing Citrix NetScaler for CVE-2026-3055 (CVSS 9.3).</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1094744974-24340/</loc>
    <image:image>
      <image:loc>https://shimiscyberworld.com/assets/images/feed/telegram-1094744974-24340.jpg</image:loc>
      <image:title>Backdoored Telnyx PyPI package pushes malware hidden in WAV audio</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1955946092-606/</loc>
    <image:image>
      <image:loc>https://cdn.prod.website-files.com/65e2696571877968e11e87f3/69bd6c4e8e5b93cbe377f92c_OSINT%20Training%20Log.%20Philippines%20Cops%20Learn%20OSINT%20at%20the%20Cyber%20Patroller%20Seminar.webp</image:loc>
      <image:title>🇵🇭 108 cybercriminals arrested. 20 victims rescued.</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1373735086-4932/</loc>
    <image:image>
      <image:loc>https://darkfeed.io/wp-content/uploads/2023/05/cropped-LOGO-BLACK-BACKGROUND.jpg</image:loc>
      <image:title>24H Cyber Pulse — ransomware &amp; breach activity snapshot</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1955946092-605/</loc>
    <image:image>
      <image:loc>https://cdn4.telesco.pe/file/X_EiHyL-QfhZ0Tw9ERGTLY9f0LuQNdOBzbksk8gQhjNUQJTQWB-hOstAqf8hi6NHEmDbFGRDkPUj3QLTHZ-xyLgrqMc68eo2GVr-ziT1s04NiN9Me1EAl9fRsOvdhopuG0AcwaTODhfL_pomPH-spKh2MKRMhSCxdshHFG6QY_JDFHBPGJj0Raryr3iXfy9Txf0bK2LCVDGHj5bXQMvV8Gajm0M2SSAW5jMuyoIbgewVLmrpE422wIMxk6E6fimnisi312QG7QCacv61pGsCAycoKz-WOfwYSfZiRdCkvpEJgbsj9CeFQ_3UGUAxljgu60hoy43x4DLmlh_VyiwTTQ.jpg</image:loc>
      <image:title>🇷🇺 A suspected Kremlin-linked operator behind coordinated incidents in Paris and Berlin, now…</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1427288221-8682/</loc>
    <image:image>
      <image:loc>https://cdn4.telesco.pe/file/rAqdIuzLgEHlcyYmEDNt-hc_1M4QpwPBbiwNESFgRy9sp8THi1H7DZSFoVc6q_xMnevn-btkrngkYqrNw6tFykcoTH-17u8C6kEazCptKVdx3Vwnr3G0bneT27JFfPVMCUfCcMj1rniWdfQeZs4iLAmxw6PDV5VD71-UjPvuF1AMZsNqM8Jmitevp-I7wCEJiLKArc3GBWKUJQo3kBtiAsMAjzlgqbUITcALyaVCY0yEAU6TsIr4utmvmxL3q5E8agu53mNdhVK2NeQxZlllcT3_5MLluwepk2yWBTF-BjyBHapaD2G_zt_LoAZqXyXgR04yoS7YuMKEN8F5H25CjQ.jpg</image:loc>
      <image:title>קבוצת הנדלה טוענת כי פרצה לקאש פאטל - ראש ה-FBI.</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/cisa-kev-CVE-2025-53521/</loc>
    <image:image>
      <image:loc>https://shimiscyberworld.com/assets/images/covers/vulnerability.svg</image:loc>
      <image:title>CVE-2025-53521 — F5 BIG-IP: F5 BIG-IP Stack-Based Buffer Overflow Vulnerability</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1707304340-2231/</loc>
    <image:image>
      <image:loc>https://cdn4.telesco.pe/file/IzkwllMqmPGUAxq7go7l2PCZz0jOMOcPgbN-9qNG2XWxSoLLkd36TSywiUgkKpm32b8alHKUOnxDjYJSY5NNaVEqj_kEKOwWrFA8UEXfW7UaWXkgzhhywNGUFzNN1sHxQD-fg_WaVAUDZ4E2s6qcpV2p074LpPVjFZT32Rf7vmmTH96rzQ1g7cuo2xwQ-KCalYwkmact5BsE3qkkkkvNNC9KMMmLFGAY2frCa28Ls6y9oA2zdTAISu4gaLbnQXyCXAyJ3wjZtnAaEgV3SOIFRrFv69aV2XON40laeBGTUBbdFJ8kixU_IDUInHSPEJ-CoMCDMqOWYvmQpqnbnp1IiA.jpg</image:loc>
      <image:title>פרצת אבטחה וגניבת כרטיסים באייאקס אמסטרדם</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1597138777-3440/</loc>
    <image:image>
      <image:loc>https://windvector.app/assets/images/og.jpg</image:loc>
      <image:title>WindVector — Detailed info on winds and air currents. It features an online map, a 3D model of…</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1597138777-3439/</loc>
    <image:image>
      <image:loc>https://tools.osintnewsletter.com/~gitbook/image?url=https%3A%2F%2F3556475550-files.gitbook.io%2F%7E%2Ffiles%2Fv0%2Fb%2Fgitbook-x-prod.appspot.com%2Fo%2Forganizations%252F4hYRP1qVZGsy1GrCYXs4%252Fsites%252Fsite_Fz5tp%252Fsocialpreview%252FNnxT7kk1xi7EHFVXiQ9R%252FThe%2520OSINT%2520Newsletter%2520OSINT%2520TOOLS%2520LIBRARY%2520Social%2520image%25202.jpg%3Falt%3Dmedia%26token%3D18136303-c2c1-49ac-8d3f-961591fd7865&amp;amp;width=1200&amp;amp;height=630&amp;amp;sign=84c5035&amp;amp;sv=2</image:loc>
      <image:title>The OSINT Tools Library is new project from Osint Newsletter and Jake Creps</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1193378452-64/</loc>
    <image:image>
      <image:loc>https://shimiscyberworld.com/assets/images/feed/telegram-1193378452-64.jpg</image:loc>
      <image:title>pwnat — инструмент для обхода NAT и создания соединения через firewall</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/cisa-kev-CVE-2026-33634/</loc>
    <image:image>
      <image:loc>https://shimiscyberworld.com/assets/images/covers/vulnerability.svg</image:loc>
      <image:title>CVE-2026-33634 — Aquasecurity Trivy: Aquasecurity Trivy Embedded Malicious Code Vulnerability</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1707304340-2230/</loc>
    <image:image>
      <image:loc>https://cdn4.telesco.pe/file/eGbmSIDZkAj3cm3BrZ0rtSDmAcXBi--ntv25GxYokzLj8HTL9rBlwLZ1pjgiY11Z_lQ1jLEtHjDY9EoVJwGtXkrsMr-ErZfqnxepZCJK4J0mYvgFjnzP4cOzm6hg6PvtiBgQxhtgf_TawCljSah9Bfxpgy5WHTxhXTKIKPdaq0nCmc1sPecoToEMfmpptitHoj5DZ8Nd6U1AEwU8ufxbk4t8hQ401YpykpTgGe7ZWPfXjSuLCmhxuvdz6I5wfTU_f1hF1Df3AJiNdsOat2cupe8aQ-YtSVqwapZyMLrLC3pB9Oe5LtSwgVU2njvsL3UA-Qz6-_woHADeL2W2dsp79A</image:loc>
      <image:title>קאלי חוגגת 20 שנה ומחזירה אותנו לשורשים של BackTrack!</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1955946092-602/</loc>
    <image:image>
      <image:loc>https://cdn4.telesco.pe/file/kV3e6pf3Zeu__uHH9HySvruc5tGNfN6lY6qXIKCisORrV7s2emyJy-2Rqwe7SkctcXbCBbTqbEcPEnIWUXYIInl7AE5Pi9kXeqlbOk27zEQGvmvajSaNHv1Nz8hKJSSfF6UAoceCgRgYUeEOGZB5CaBSb2s0447MHKa7Qy75X9QMY9LFKjTlY5gJ5SyEsGht5K1bMO6AVVvRhwIqiJLWQsN2H_h3U8YfmGAhwUHU83e18gKvsyxKlZfbk7mBFgneV2a38GIHUqRt2Y8DIclF0gcluIo8O2w2JoAOBkPaPPsyaRGWXA_7fXVGroJVhsTpRuVkmyz8Hgj1gDK78fPeFA.jpg</image:loc>
      <image:title>Thanks to the team at OSINT Shadows 2026 for inviting our CEO Nathaniel Fried to speak on “How to…</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1707304340-2229/</loc>
    <image:image>
      <image:loc>https://cdn4.telesco.pe/file/TdJcUS6qzEifsc1LIbsjmV0taAN02-l7aPKfDDiTZG0rU2ndGAq6uAXsWelh_H2baw8HX2RbZO7c92Z7PtwdoBMfz_9ji5zubSv9tHbREr6vsJ2-M8CbY7JX2j_pTRRTjeLs8fiJDserQLhHC9bxiGC7x0gpDXuMFVDMqr0wNwRnU7ZWWS_g7_eWIWUGf-RXkgjMYmmdANNI63t_1_R_8E5aUBIZyLvJ96VsoBN7kJMWgZa4oiAr_NMLxeuZhix06qCW9Sumpx68NIlSsuj0MbZxdcmBQ0Ab7mr6yS0VT9JbmCVt6UKAzqeOtIOzOT7gfKmXTP9UERhvZrUWo61ntw.jpg</image:loc>
      <image:title>מתקפת כופר משתקת את נמל הסחר ויגו ספרד 🇪🇸</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1193378452-63/</loc>
    <image:image>
      <image:loc>https://shimiscyberworld.com/assets/images/feed/telegram-1193378452-63.jpg</image:loc>
      <image:title>RelayKing — Комплексный инструмент для обнаружения и перечисления возможностей relay-атак,…</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/cisa-kev-CVE-2026-33017/</loc>
    <image:image>
      <image:loc>https://shimiscyberworld.com/assets/images/covers/vulnerability.svg</image:loc>
      <image:title>CVE-2026-33017 — Langflow Langflow: Langflow Code Injection Vulnerability</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1707304340-2224/</loc>
    <image:image>
      <image:loc>https://cdn4.telesco.pe/file/TdJcUS6qzEifsc1LIbsjmV0taAN02-l7aPKfDDiTZG0rU2ndGAq6uAXsWelh_H2baw8HX2RbZO7c92Z7PtwdoBMfz_9ji5zubSv9tHbREr6vsJ2-M8CbY7JX2j_pTRRTjeLs8fiJDserQLhHC9bxiGC7x0gpDXuMFVDMqr0wNwRnU7ZWWS_g7_eWIWUGf-RXkgjMYmmdANNI63t_1_R_8E5aUBIZyLvJ96VsoBN7kJMWgZa4oiAr_NMLxeuZhix06qCW9Sumpx68NIlSsuj0MbZxdcmBQ0Ab7mr6yS0VT9JbmCVt6UKAzqeOtIOzOT7gfKmXTP9UERhvZrUWo61ntw.jpg</image:loc>
      <image:title>אירוע סייבר במשרד האוצר ההולנדי, מערכות פנימיות נותקו מחשש להתפשטות</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1707304340-2223/</loc>
    <image:image>
      <image:loc>https://cdn4.telesco.pe/file/h6fGD5Dyy8I1XQ7yhalYEhnnOur0FGcgRYz4Uur4RlyjbLqlsMejiIpxPMkBsRZGRfpaeGUNAElJv8dF6nb8rpJ3DkbDGmsIFGaxqpDHNd9GfJj3KwLA7kAztKIC498w8XYVVnZSRaM3gYnk-NkdWCncrdVTVgwwc0BVB1Ly2QqO8WlbqCd4GUKNP70FPShjtCeUVlUs8DfLoN2ZqMU5_wn0w_W0oO0gxH9MDDwysudhKFCSzuVkuOEAaeXiuFv_gA3SALHqBNtusF_3wsCI83y8balpLFUHq05wyVYk7HL8AfRwsDOigWSdEGkCd1QiwOjnHOgt5sVEiRvhapDgMw.jpg</image:loc>
      <image:title>גוגל שחררה עדכון אבטחה נוסף ל-Chrome 146 המתקן שמונה ליקויי אבטחה חמורים בזיכרון, כולל פגיעויות…</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1955946092-600/</loc>
    <image:image>
      <image:loc>https://cdn4.telesco.pe/file/cPomgZIMb6-C-jBVPrRp3X6Y0EQkbpyauJ32zluUdjp4CR3jcUaPXF0V_UFotxqFhnLEY85UpTLfH08ACoH9OiYgdeSBjECLXrr7LlNw7LHDdKY-93fOlwpaJHjZLl2tmng8Rkt3Sr7SHsbz7Tn0tb6WdcvBerITyFbGCT-Vkm7vHLX6uqPrsAl_lyL1YSgzaH0qsOM8_3Yp-pSMKwgUQzOriRq6Z7beGJhzw2bBxTSHzLUfvQyZKzifyXG_Pf3_lbSbFZBpE_0HNUcMzBGQyXR-btRqpgVCrtiyE-urcGSAvHdRaGOySnItgfGrm20FuGdpKvgm91kPovx2FhY7mA.jpg</image:loc>
      <image:title>X advanced search OSINT tip 🔍</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1597138777-3435/</loc>
    <image:image>
      <image:loc>https://canirun.ai/og/home.png</image:loc>
      <image:title>Can I Run — A free online tool that helps you determine which AI models you can run locally on your…</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1707304340-2222/</loc>
    <image:image>
      <image:loc>https://cdn4.telesco.pe/file/lWsaH8vVHsFuYIPfeDMasTiDtoS2UNRJuaXLi0tfZkE0wMDnOdlzBjfRx8tSCNtjMdhCBJA15CmzIEeOJhJDmK3DpK4f50RHp_XmkqSrHSFL1lg6n2-HH0RHzCWdox9O7JwAKMFBPIvPefKU1wxubFGog_8cAGrKseOGHjTGJmWp2zj-jk_wsqDowOi8YEotFA-K-Zr_KBld3tcfNE-u8Zmx8CEAbYmHSC0QqgTxhgzIB2fEn1WUrowtibiYfJHzFDVeswpG6HK40imO3L3VK-dciiRnOQbMQnJgftUTKlM3CW1OmPGhSXHAGM-Lk5GckK1bHZ_CttyzYEvXF39oYA.jpg</image:loc>
      <image:title>הבית הלבן מכניס את ה-UAP לדומין gov 👀</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1193378452-62/</loc>
    <image:image>
      <image:loc>https://shimiscyberworld.com/assets/images/feed/telegram-1193378452-62.jpg</image:loc>
      <image:title>Специалисты из центра киберзащиты Ontinue обнаружили, что злоумышленники использовали Nezha —…</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1955946092-598/</loc>
    <image:image>
      <image:loc>https://cdn.prod.website-files.com/65e2696571877968e11e87f3/69bd80339acd4450637b52d6_OSINT%20on%20the%20Front%20Line.%20How%20War%20Zone%20OSINT%20is%20Changing%20Conflict.webp</image:loc>
      <image:title>How to cut through the fog of war with OSINT</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1707304340-2220/</loc>
    <image:image>
      <image:loc>https://cdn4.telesco.pe/file/lWsaH8vVHsFuYIPfeDMasTiDtoS2UNRJuaXLi0tfZkE0wMDnOdlzBjfRx8tSCNtjMdhCBJA15CmzIEeOJhJDmK3DpK4f50RHp_XmkqSrHSFL1lg6n2-HH0RHzCWdox9O7JwAKMFBPIvPefKU1wxubFGog_8cAGrKseOGHjTGJmWp2zj-jk_wsqDowOi8YEotFA-K-Zr_KBld3tcfNE-u8Zmx8CEAbYmHSC0QqgTxhgzIB2fEn1WUrowtibiYfJHzFDVeswpG6HK40imO3L3VK-dciiRnOQbMQnJgftUTKlM3CW1OmPGhSXHAGM-Lk5GckK1bHZ_CttyzYEvXF39oYA.jpg</image:loc>
      <image:title>עדכוני סייבר - סיכום שבת ✨</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1597138777-3433/</loc>
    <image:image>
      <image:loc>https://discordgate.com/meta/home.png</image:loc>
      <image:title>Discord Tools Hub — 11 online tools for gathering info about Discord servers:</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-3473788116-30/</loc>
    <image:image>
      <image:loc>https://shimiscyberworld.com/assets/images/feed/telegram-3473788116-30.jpg</image:loc>
      <image:title>Eid Mubarak from Cidint! 🌱</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1955946092-596/</loc>
    <image:image>
      <image:loc>https://cdn.prod.website-files.com/65e2696571877968e11e87f3/69a5b34bcaebd6eaeec6033c_OSINT%2C%20Wiretaps%20and%20Encrypted%20Apps.%20How%20El%20Chapo%20Fell%20(and%20How%20OSINT%20Would%20Catch%20Him%20Today).webp</image:loc>
      <image:title>El Chapo used burner phones. Wiretaps still brought him down.</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/cisa-kev-CVE-2025-54068/</loc>
    <image:image>
      <image:loc>https://shimiscyberworld.com/assets/images/covers/vulnerability.svg</image:loc>
      <image:title>CVE-2025-54068 — Laravel Livewire: Laravel Livewire Code Injection Vulnerability</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/cisa-kev-CVE-2025-43520/</loc>
    <image:image>
      <image:loc>https://shimiscyberworld.com/assets/images/covers/vulnerability.svg</image:loc>
      <image:title>CVE-2025-43520 — Apple Multiple Products: Apple Multiple Products Classic Buffer Overflow Vulnerability</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/cisa-kev-CVE-2025-43510/</loc>
    <image:image>
      <image:loc>https://shimiscyberworld.com/assets/images/covers/vulnerability.svg</image:loc>
      <image:title>CVE-2025-43510 — Apple Multiple Products: Apple Multiple Products Improper Locking Vulnerability</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/cisa-kev-CVE-2025-32432/</loc>
    <image:image>
      <image:loc>https://shimiscyberworld.com/assets/images/covers/vulnerability.svg</image:loc>
      <image:title>CVE-2025-32432 — Craft CMS Craft CMS: Craft CMS Code Injection Vulnerability</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/cisa-kev-CVE-2025-31277/</loc>
    <image:image>
      <image:loc>https://shimiscyberworld.com/assets/images/covers/vulnerability.svg</image:loc>
      <image:title>CVE-2025-31277 — Apple Multiple Products: Apple Multiple Products Buffer Overflow Vulnerability</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1707304340-2218/</loc>
    <image:image>
      <image:loc>https://cdn4.telesco.pe/file/VmessxBdrD00dePlKXCMHrKHxJ1GyJyClc_0uAbts2VlYNj9hJNOnoQNVE9wZngPYAf1D5tYtLlptiQLv1Bl6y7qo5D3moRTRpFLIZAshPAUjfDPwNWZNYpVHuBLWfwJjgL6NpW7MLenBYeSgy_zYDE4Hat1Gl7nLnh_gMb29ixXPRyD374-Lu5F0itTGbMaMwHhr7nhHmvwNt1ZwP7ECxjBEore8NyQICO2emZ-pqet7j2X0oEyxeUwdmnRXE3ky1P4py7WTN7lcBbTZ-WSRzXGa_RqrPIQrxIijKWvJmIdjIUxpX4jo3C8cBk88s5MgiL87g1Dkoi2a9JFZ6AWJQ.jpg</image:loc>
      <image:title>חיסול האקר משמרות המהפכה בביתו</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1146842892-1009/</loc>
    <image:image>
      <image:loc>https://krebsonsecurity.com/wp-content/uploads/2026/01/ss-botnet.png</image:loc>
      <image:title>Feds Disrupt IoT Botnets Behind Huge DDoS Attacks</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1955946092-594/</loc>
    <image:image>
      <image:loc>https://cdn.prod.website-files.com/65e2696571877968e11e87f3/69a9754891e339513db44e4c_Infamy%20Complex.%20OSINT%20Fugitive%20Intelligence%20Catches%20Criminals%20Who%20Can%E2%80%99t%20Log%20Off.webp</image:loc>
      <image:title>Wanted for exploiting a minor and drug offences. One username led to his arrest.</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/cisa-kev-CVE-2026-20131/</loc>
    <image:image>
      <image:loc>https://shimiscyberworld.com/assets/images/covers/vulnerability.svg</image:loc>
      <image:title>CVE-2026-20131 — Cisco Secure Firewall Management Center (FMC): Cisco Secure Firewall Management Center (FMC) Software and Cisco Security Cloud Control (SCC) Firewall Management Deserialization of Untrusted Data Vulnerability</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1597138777-3431/</loc>
    <image:image>
      <image:loc>https://hackerz.space/cdn/shop/files/giphy.webp?v=1771418749&amp;width=1070</image:loc>
      <image:title>RECOX — Free, simple and quick online tool to find subdomains and endpoints.</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/cisa-kev-CVE-2026-20963/</loc>
    <image:image>
      <image:loc>https://shimiscyberworld.com/assets/images/covers/vulnerability.svg</image:loc>
      <image:title>CVE-2026-20963 — Microsoft SharePoint: Microsoft SharePoint Deserialization of Untrusted Data Vulnerability</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/cisa-kev-CVE-2025-66376/</loc>
    <image:image>
      <image:loc>https://shimiscyberworld.com/assets/images/covers/vulnerability.svg</image:loc>
      <image:title>CVE-2025-66376 — Synacor Zimbra Collaboration Suite (ZCS): Synacor Zimbra Collaboration Suite (ZCS) Cross-Site Scripting Vulnerability</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1193378452-61/</loc>
    <image:image>
      <image:loc>https://shimiscyberworld.com/assets/images/feed/telegram-1193378452-61.jpg</image:loc>
      <image:title>Более 10 000 смартфонов россиян заразились Android-трояном Falcon</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-3473788116-29/</loc>
    <image:image>
      <image:loc>https://shimiscyberworld.com/assets/images/feed/telegram-3473788116-29.jpg</image:loc>
      <image:title>Massive Breach Report☘</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/cisa-kev-CVE-2025-47813/</loc>
    <image:image>
      <image:loc>https://shimiscyberworld.com/assets/images/covers/vulnerability.svg</image:loc>
      <image:title>CVE-2025-47813 — Wing FTP Server Wing FTP Server: Wing FTP Server Information Disclosure Vulnerability</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1597138777-3429/</loc>
    <image:image>
      <image:loc>https://substackcdn.com/image/fetch/$s_!KNaa!,w_1200,h_675,c_fill,f_jpg,q_auto:good,fl_progressive:steep,g_auto/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9fcbdf13-068a-4aff-9f26-3276bf09d2fe_1000x1062.png</image:loc>
      <image:title>United Kingdom OSINT</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1193378452-60/</loc>
    <image:image>
      <image:loc>https://shimiscyberworld.com/assets/images/feed/telegram-1193378452-60.jpg</image:loc>
      <image:title>А это уже не просто шаблоны для своей разработки, это целый тулкит</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/incd-alert_1979/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1680992046626-418f7e910589?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>DDoS Attack Prevention: INCD Advisory for Israeli Organizations</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1193378452-59/</loc>
    <image:image>
      <image:loc>https://shimiscyberworld.com/assets/images/feed/telegram-1193378452-59.jpg</image:loc>
      <image:title>Хз как и почему, но adaptixc2 теперь есть в репозиториях Kali Linux (хоть и версия 1.1) 😁</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1597138777-3428/</loc>
    <image:image>
      <image:loc>https://substackcdn.com/image/fetch/$s_!yt0_!,w_1200,h_675,c_fill,f_jpg,q_auto:good,fl_progressive:steep,g_auto/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdf498ed4-f037-4d27-8aa8-3b33fa6242d4_1172x863.webp</image:loc>
      <image:title>Geolocation OSINT: How to Master Location Analysis</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/incd-alert_1978/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1506399558188-acca6f8cbf41?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Medical Device Firm Hit by Cyberattack, INCD Warns</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/incd-alert_1976/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1770159116807-9b2a7bb82294?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Microsoft&apos;s March 2024 Security Updates: Critical Vulnerabilities Addressed</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/cisa-kev-CVE-2026-3910/</loc>
    <image:image>
      <image:loc>https://shimiscyberworld.com/assets/images/covers/vulnerability.svg</image:loc>
      <image:title>CVE-2026-3910 — Google Chromium V8: Google Chromium V8 Improper Restriction of Operations Within the Bounds of a Memory Buffer Vulnerability</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/cisa-kev-CVE-2026-3909/</loc>
    <image:image>
      <image:loc>https://shimiscyberworld.com/assets/images/covers/vulnerability.svg</image:loc>
      <image:title>CVE-2026-3909 — Google Skia: Google Skia Out-of-Bounds Write Vulnerability</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1597138777-3426/</loc>
    <image:image>
      <image:loc>https://skyosint.io/earth-night.jpg</image:loc>
      <image:title>SkyOSINT — Real-time tracking of 16K+ objects on the sky. Allow to analyze anomalies, maneuvers,…</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/incd-alert_1975/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1760199789463-b523db55dd8b?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Critical Rockwell Controller Flaw Exploited in Global Attacks</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/incd-alert_1974/</loc>
    <image:image>
      <image:loc>https://images.unsplash.com/photo-1573164713988-8665fc963095?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80</image:loc>
      <image:title>Cloud Resilience Isn&apos;t Backup: INCD Warns Against Data Loss Risks</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/cisa-kev-CVE-2025-68613/</loc>
    <image:image>
      <image:loc>https://shimiscyberworld.com/assets/images/covers/vulnerability.svg</image:loc>
      <image:title>CVE-2025-68613 — n8n n8n: n8n Improper Control of Dynamically-Managed Code Resources Vulnerability</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1146842892-1007/</loc>
    <image:image>
      <image:loc>https://krebsonsecurity.com/wp-content/uploads/2026/03/winupdatechecking.png</image:loc>
      <image:title>Microsoft Patch Tuesday, March 2026 Edition</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1193378452-58/</loc>
    <image:image>
      <image:loc>https://shimiscyberworld.com/assets/images/feed/telegram-1193378452-58.jpg</image:loc>
      <image:title>Есть такие популярные уже готовые self-hosted лаборатории AD для тестов и тренировок: GOAD, SCCM,…</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1597138777-3425/</loc>
    <image:image>
      <image:loc>https://opengraph.githubassets.com/fd8760797b5db11a95beca53bd0d2842bc0a6fab7a131082f6a29953783b3966/ubikron/OSINT-newsletters</image:loc>
      <image:title>OSINT Newsletters — Github repository with a list of OSINT newsletters (active in recent months or…</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/cisa-kev-CVE-2026-1603/</loc>
    <image:image>
      <image:loc>https://shimiscyberworld.com/assets/images/covers/vulnerability.svg</image:loc>
      <image:title>CVE-2026-1603 — Ivanti  Endpoint Manager (EPM): Ivanti Endpoint Manager (EPM) Authentication Bypass Vulnerability</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/cisa-kev-CVE-2025-26399/</loc>
    <image:image>
      <image:loc>https://shimiscyberworld.com/assets/images/covers/vulnerability.svg</image:loc>
      <image:title>CVE-2025-26399 — SolarWinds Web Help Desk: SolarWinds Web Help Desk Deserialization of Untrusted Data Vulnerability</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/cisa-kev-CVE-2021-22054/</loc>
    <image:image>
      <image:loc>https://shimiscyberworld.com/assets/images/covers/vulnerability.svg</image:loc>
      <image:title>CVE-2021-22054 — Omnissa Workspace One UEM: Omnissa Workspace ONE Server-Side Request Forgery</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-3473788116-27/</loc>
    <image:image>
      <image:loc>https://shimiscyberworld.com/assets/images/feed/telegram-3473788116-27.jpg</image:loc>
      <image:title>Happy Women&apos;s Day 🧕</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1193378452-57/</loc>
    <image:image>
      <image:loc>https://shimiscyberworld.com/assets/images/feed/telegram-1193378452-57.jpg</image:loc>
      <image:title>Новый агент Maverick (хотя я бы сказал шаблон)</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-3473788116-26/</loc>
    <image:image>
      <image:loc>https://shimiscyberworld.com/assets/images/feed/telegram-3473788116-26.jpg</image:loc>
      <image:title>Limited Time Hiring✨</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1193378452-56/</loc>
    <image:image>
      <image:loc>https://shimiscyberworld.com/assets/images/feed/telegram-1193378452-56.jpg</image:loc>
      <image:title>В Packagist обнаружены вредоносные Laravel-пакеты, распространяющие RAT для Windows, macOS и…</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1193378452-55/</loc>
    <image:image>
      <image:loc>https://shimiscyberworld.com/assets/images/feed/telegram-1193378452-55.jpg</image:loc>
      <image:title>Вот такая крутота появляется, а значит идея с гибкими расширениями работает.</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1193378452-53/</loc>
    <image:image>
      <image:loc>https://shimiscyberworld.com/assets/images/feed/telegram-1193378452-53.jpg</image:loc>
      <image:title>В последней версии были убраны оповещения в Tg/Web. Теперь это отдельный service extender, который…</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/cisa-kev-CVE-2023-43000/</loc>
    <image:image>
      <image:loc>https://shimiscyberworld.com/assets/images/covers/vulnerability.svg</image:loc>
      <image:title>CVE-2023-43000 — Apple Multiple Products: Apple Multiple products Use-After-Free Vulnerability</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/cisa-kev-CVE-2023-41974/</loc>
    <image:image>
      <image:loc>https://shimiscyberworld.com/assets/images/covers/vulnerability.svg</image:loc>
      <image:title>CVE-2023-41974 — Apple iOS and iPadOS: Apple iOS and iPadOS Use-After-Free Vulnerability</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/cisa-kev-CVE-2021-30952/</loc>
    <image:image>
      <image:loc>https://shimiscyberworld.com/assets/images/covers/vulnerability.svg</image:loc>
      <image:title>CVE-2021-30952 — Apple Multiple Products: Apple Multiple Products Integer Overflow or Wraparound Vulnerability</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/cisa-kev-CVE-2021-22681/</loc>
    <image:image>
      <image:loc>https://shimiscyberworld.com/assets/images/covers/vulnerability.svg</image:loc>
      <image:title>CVE-2021-22681 — Rockwell Multiple Products: Rockwell Multiple Products Insufficient Protected Credentials Vulnerability</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/cisa-kev-CVE-2017-7921/</loc>
    <image:image>
      <image:loc>https://shimiscyberworld.com/assets/images/covers/vulnerability.svg</image:loc>
      <image:title>CVE-2017-7921 — Hikvision Multiple Products: Hikvision Multiple Products Improper Authentication Vulnerability</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-3473788116-24/</loc>
    <image:image>
      <image:loc>https://shimiscyberworld.com/assets/images/feed/telegram-3473788116-24.jpg</image:loc>
      <image:title>Happy Holi🌸 — Wishing you a vibrant Holi filled with colors, joy, and laughter! May your day be…</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1193378452-52/</loc>
    <image:image>
      <image:loc>https://shimiscyberworld.com/assets/images/feed/telegram-1193378452-52.jpg</image:loc>
      <image:title>AdaptixC2 v1.2 UPDATE</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1146842892-1005/</loc>
    <image:image>
      <image:loc>https://krebsonsecurity.com/wp-content/uploads/2026/02/ben-door.png</image:loc>
      <image:title>Who is the Kimwolf Botmaster “Dort”?</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1390175645-401/</loc>
    <image:image>
      <image:loc>https://redactie.rtl.nl/sites/default/files/content/images/2026/02/26/ANP-551730090.jpg?itok=Y2-dIs1z&amp;width=512&amp;height=288&amp;impolicy=semi_dynamic</image:loc>
      <image:title>🆕 New breach: Odido - 316,912 breached accounts</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-3473788116-23/</loc>
    <image:image>
      <image:loc>https://shimiscyberworld.com/assets/images/feed/telegram-3473788116-23.jpg</image:loc>
      <image:title>Ramadan Kareem from Cidint</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1193378452-51/</loc>
    <image:image>
      <image:loc>https://shimiscyberworld.com/assets/images/feed/telegram-1193378452-51.jpg</image:loc>
      <image:title>Кто-то реализовал линуховый beacon для Cobalt Strike</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1193378452-50/</loc>
    <image:image>
      <image:loc>https://shimiscyberworld.com/assets/images/feed/telegram-1193378452-50.jpg</image:loc>
      <image:title>Всем привет! — Все сталкивались с ситуациями, когда в корпоративной среде используются в качестве…</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1193378452-49/</loc>
    <image:image>
      <image:loc>https://shimiscyberworld.com/assets/images/feed/telegram-1193378452-49.jpg</image:loc>
      <image:title>Malchela — Модульный набор инструментов для анализа YARA и вредоносного ПО, написанный на Rust.…</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1146842892-1002/</loc>
    <image:image>
      <image:loc>https://krebsonsecurity.com/wp-content/uploads/2022/07/winupdatedate.png</image:loc>
      <image:title>Patch Tuesday, February 2026 Edition</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1193378452-48/</loc>
    <image:image>
      <image:loc>https://shimiscyberworld.com/assets/images/feed/telegram-1193378452-48.jpg</image:loc>
      <image:title>AdaptixC2 v1.1 UPDATE</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1146842892-1000/</loc>
    <image:image>
      <image:loc>https://krebsonsecurity.com/wp-content/uploads/2026/01/badboxpanel.png</image:loc>
      <image:title>Who Operates the Badbox 2.0 Botnet?</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-3473788116-22/</loc>
    <image:image>
      <image:loc>https://shimiscyberworld.com/assets/images/feed/telegram-3473788116-22.jpg</image:loc>
      <image:title>🇮🇳Happy Republic Day🇮🇳</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-3473788116-21/</loc>
    <image:image>
      <image:loc>https://shimiscyberworld.com/assets/images/feed/telegram-3473788116-21.jpg</image:loc>
      <image:title>Want to stay updated on the latest OSINT tools and investigative techniques?</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1146842892-999/</loc>
    <image:image>
      <image:loc>https://krebsonsecurity.com/wp-content/uploads/2026/01/ss-botnet.png</image:loc>
      <image:title>Kimwolf Botnet Lurking in Corporate, Govt. Networks</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1193378452-45/</loc>
    <image:image>
      <image:loc>https://swarm.ptsecurity.com/wp-content/uploads/2026/01/942ac17c-cover.png</image:loc>
      <image:title>Microsoft fixed an authenticated RCE in Windows Telephony Service (CVE-2026-20931), discovered…</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-3473788116-19/</loc>
    <image:image>
      <image:loc>https://shimiscyberworld.com/assets/images/feed/telegram-3473788116-19.jpg</image:loc>
      <image:title>Data Center Professional🔗</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-3473788116-18/</loc>
    <image:image>
      <image:loc>https://shimiscyberworld.com/assets/images/feed/telegram-3473788116-18.jpg</image:loc>
      <image:title>Modern OSINT Professional Program🧠</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1146842892-996/</loc>
    <image:image>
      <image:loc>https://krebsonsecurity.com/wp-content/uploads/2025/12/china-overseasuseonly.png</image:loc>
      <image:title>The Kimwolf Botnet is Stalking Your Local Network</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-3473788116-17/</loc>
    <image:image>
      <image:loc>https://shimiscyberworld.com/assets/images/feed/telegram-3473788116-17.jpg</image:loc>
      <image:title>Direct Join Link🪴</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1146842892-992/</loc>
    <image:image>
      <image:loc>https://krebsonsecurity.com/wp-content/uploads/2022/07/winupdatedate.png</image:loc>
      <image:title>Microsoft Patch Tuesday, December 2025 Edition</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1612076453-20/</loc>
    <image:image>
      <image:loc>https://shimiscyberworld.com/assets/images/feed/telegram-1612076453-20.jpg</image:loc>
      <image:title>The robots are taking over</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1612076453-15/</loc>
    <image:image>
      <image:loc>https://shimiscyberworld.com/assets/images/feed/telegram-1612076453-15.jpg</image:loc>
      <image:title>Thoughts on the new mascot?</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1316681366-1958/</loc>
    <image:image>
      <image:loc>https://shimiscyberworld.com/assets/images/feed/telegram-1316681366-1958.jpg</image:loc>
      <image:title>whoAMI attack could allow remote code execution within AWS account</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1316681366-1957/</loc>
    <image:image>
      <image:loc>https://shimiscyberworld.com/assets/images/feed/telegram-1316681366-1957.jpg</image:loc>
      <image:title>How Wiz found a Critical NVIDIA AI vulnerability: Deep Dive into a container escape (CVE-2024-0132)</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1316681366-1956/</loc>
    <image:image>
      <image:loc>https://shimiscyberworld.com/assets/images/feed/telegram-1316681366-1956.jpg</image:loc>
      <image:title>دیشب یه ویدیو از جادی دیدم در مورد &quot;آرون سوارتس&quot; و کاراش و دلیلی که خودش رو کشت لینک ویدیو</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1316681366-1952/</loc>
    <image:image>
      <image:loc>https://shimiscyberworld.com/assets/images/feed/telegram-1316681366-1952.jpg</image:loc>
      <image:title>Exploring the DOMPurify library: Hunting for Misconfigurations (2/2)</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1316681366-1949/</loc>
    <image:image>
      <image:loc>https://shimiscyberworld.com/assets/images/feed/telegram-1316681366-1949.jpg</image:loc>
      <image:title>Experts discovered PostgreSQL flaw chained with BeyondTrust zeroday in targeted attacks</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1316681366-1948/</loc>
    <image:image>
      <image:loc>https://shimiscyberworld.com/assets/images/feed/telegram-1316681366-1948.jpg</image:loc>
      <image:title>تکنیک های جدید برای هک کردن برنامه نویس ها و حتی بچه های حوزه امنیت به شدت عجیب غریب شده. یکی از…</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1316681366-1944/</loc>
    <image:image>
      <image:loc>https://shimiscyberworld.com/assets/images/feed/telegram-1316681366-1944.jpg</image:loc>
      <image:title>I Found a Game Exploit That Lets Hackers Take Over Your PC</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1316681366-1942/</loc>
    <image:image>
      <image:loc>https://shimiscyberworld.com/assets/images/feed/telegram-1316681366-1942.jpg</image:loc>
      <image:title>Go Supply Chain Attack: Malicious Package Exploits Go Module Proxy Caching for Persistence</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1316681366-1941/</loc>
    <image:image>
      <image:loc>https://shimiscyberworld.com/assets/images/feed/telegram-1316681366-1941.jpg</image:loc>
      <image:title>Super-charging Bug Bounty Hunting with the Power of AI</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1316681366-1940/</loc>
    <image:image>
      <image:loc>https://shimiscyberworld.com/assets/images/feed/telegram-1316681366-1940.jpg</image:loc>
      <image:title>Abusing libxml2 quirks to bypass SAML authentication on GitHub Enterprise (CVE-2025-23369)🔥</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1316681366-1939/</loc>
    <image:image>
      <image:loc>https://shimiscyberworld.com/assets/images/feed/telegram-1316681366-1939.jpg</image:loc>
      <image:title>منهایامنیت — دلار 90 هزار تومنی و سکه 70 میلیون تومنی.</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-2115251817-20/</loc>
    <image:image>
      <image:loc>https://shimiscyberworld.com/assets/images/feed/telegram-2115251817-20.jpg</image:loc>
      <image:title>Logistics and Warehousing:</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-2115251817-19/</loc>
    <image:image>
      <image:loc>https://shimiscyberworld.com/assets/images/feed/telegram-2115251817-19.jpg</image:loc>
      <image:title>Search and Rescue: — Drones equipped with thermal cameras and other sensors can aid in search and…</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-2115251817-17/</loc>
    <image:image>
      <image:loc>https://shimiscyberworld.com/assets/images/feed/telegram-2115251817-17.jpg</image:loc>
      <image:title>Energy Sector: — Drones are used in the energy sector for inspecting power lines, wind turbines,…</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-2115251817-16/</loc>
    <image:image>
      <image:loc>https://shimiscyberworld.com/assets/images/feed/telegram-2115251817-16.jpg</image:loc>
      <image:title>Mining: — Drones can survey mining sites, monitor stockpiles, and assess the condition of mining…</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-2115251817-15/</loc>
    <image:image>
      <image:loc>https://shimiscyberworld.com/assets/images/feed/telegram-2115251817-15.jpg</image:loc>
      <image:title>Construction and Infrastructure Inspection:</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-2115251817-14/</loc>
    <image:image>
      <image:loc>https://shimiscyberworld.com/assets/images/feed/telegram-2115251817-14.jpg</image:loc>
      <image:title>Agriculture: — Agricultural drones are used for crop monitoring, precision agriculture, and…</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-2115251817-13/</loc>
    <image:image>
      <image:loc>https://shimiscyberworld.com/assets/images/feed/telegram-2115251817-13.jpg</image:loc>
      <image:title>Surveying and Mapping:</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-2115251817-11/</loc>
    <image:image>
      <image:loc>https://shimiscyberworld.com/assets/images/feed/telegram-2115251817-11.jpg</image:loc>
      <image:title>Increasing global threats against systems IT and OT</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-2115251817-9/</loc>
    <image:image>
      <image:loc>https://shimiscyberworld.com/assets/images/feed/telegram-2115251817-9.jpg</image:loc>
      <image:title>Augmented Reality (AR) and Virtual Reality (VR) devices:</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-2115251817-6/</loc>
    <image:image>
      <image:loc>https://shimiscyberworld.com/assets/images/feed/telegram-2115251817-6.jpg</image:loc>
      <image:title>3D printers: Additive manufacturing technology has revolutionized the production process</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-2115251817-5/</loc>
    <image:image>
      <image:loc>https://shimiscyberworld.com/assets/images/feed/telegram-2115251817-5.jpg</image:loc>
      <image:title>Industrial drones: Drones are being used in industries such as agriculture, construction,</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-2115251817-4/</loc>
    <image:image>
      <image:loc>https://shimiscyberworld.com/assets/images/feed/telegram-2115251817-4.jpg</image:loc>
      <image:title>Collaborative robots (cobots): These are robots designed to work alongside humans in</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1000804529-14/</loc>
    <image:image>
      <image:loc>https://shimiscyberworld.com/assets/images/feed/telegram-1000804529-14.jpg</image:loc>
      <image:title>Us Cyber Heist Swift Iduskcn11600C</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1000804529-13/</loc>
    <image:image>
      <image:loc>https://shimiscyberworld.com/assets/images/feed/telegram-1000804529-13.jpg</image:loc>
      <image:title>Security | IBM</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1000804529-12/</loc>
    <image:image>
      <image:loc>https://shimiscyberworld.com/assets/images/feed/telegram-1000804529-12.jpg</image:loc>
      <image:title>Security | IBM</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1000804529-7/</loc>
    <image:image>
      <image:loc>https://shimiscyberworld.com/assets/images/feed/telegram-1000804529-7.jpg</image:loc>
      <image:title>A Lastpass Hack With A Happy Ending</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1000804529-6/</loc>
    <image:image>
      <image:loc>https://shimiscyberworld.com/assets/images/feed/telegram-1000804529-6.jpg</image:loc>
      <image:title>The Irony Of Ethics In Malware</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1000804529-5/</loc>
    <image:image>
      <image:loc>https://shimiscyberworld.com/assets/images/feed/telegram-1000804529-5.jpg</image:loc>
      <image:title>On Password Managers Perspective And Patience</image:title>
    </image:image>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1000804529-4/</loc>
    <image:image>
      <image:loc>https://shimiscyberworld.com/assets/images/feed/telegram-1000804529-4.jpg</image:loc>
      <image:title>Microsoft To Host Data In Germany To Evade Us Spying</image:title>
    </image:image>
  </url></urlset>
