<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9"
        xmlns:news="http://www.google.com/schemas/sitemap-news/0.9"><url>
    <loc>https://shimiscyberworld.com/posts/2026-05-18-nvd-CVE-2026-47090/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-23T01:19:55+03:00</news:publication_date>
      <news:title></news:title>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/daily-digest/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-22T23:00:00+03:00</news:publication_date>
      <news:title>Daily Security Digest — 2026-05-22</news:title><news:keywords>daily-digest, vulnerability, cve, high-severity, cwe-88, privilege-escalation, cwe-863, critical, remote-code-execution, cwe-434</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/ghostwriter-targets-ukraine-government-entities-with-prometh-bwi6o/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-22T19:20:32+03:00</news:publication_date>
      <news:title>Ghostwriter Targets Ukraine Government with Prometheus Phishing</news:title><news:keywords>threat-intel, vulnerability, malware, phishing</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/in-other-news-industrial-router-exploitation-cisa-kev-nomi-biz1y/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-22T17:07:06+03:00</news:publication_date>
      <news:title>Huawei Router Flaw Triggered Telecom Blackout, SecurityWeek Reports</news:title><news:keywords>threat-intel, vulnerability, identity</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/trend-micro-warns-of-apex-one-zero-day-exploited-in-the-wild-lf7fe/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-22T16:39:19+03:00</news:publication_date>
      <news:title>Trend Micro Apex One Zero-Day Under Active Exploitation</news:title><news:keywords>threat-intel, data-breach, malware, vulnerability, microsoft</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/tracking-iranian-apt-screening-serpens-2026-espionage-campa-bwdjf/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-22T16:00:42+03:00</news:publication_date>
      <news:title>Iranian APT Screening Serpens Uses AppDomainManager Hijacking in Espionage Campaigns</news:title><news:keywords>threat-intel, apt, malware, research, unit-42</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1542954397-4607/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-22T15:03:46+03:00</news:publication_date>
      <news:title>Chromium Exploit Code Leaked for Unpatched Browser Fetch Vulnerability</news:title><news:keywords>vulnerability</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/ubiquiti-patches-three-max-severity-unifi-os-vulnerabilities-phgxb/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-22T15:00:42+03:00</news:publication_date>
      <news:title>Ubiquiti Patches Three Max Severity UniFi OS Vulnerabilities</news:title><news:keywords>threat-intel, data-breach, malware, vulnerability, tools</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/megalodon-github-attack-targets-5-561-repos-with-malicious-c-n7fj3/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-22T14:55:24+03:00</news:publication_date>
      <news:title>Megalodon GitHub Attack: 5,561 Repos Hit with Malicious CI/CD Workflows</news:title><news:keywords>threat-intel, vulnerability, tools</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/making-vulnerable-drivers-exploitable-without-hardware-the-tr7vj/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-22T14:38:12+03:00</news:publication_date>
      <news:title>Windows Kernel Drivers Can Be Exploited Without Hardware, The Hacker News Reports</news:title><news:keywords>threat-intel, vulnerability, microsoft, the-hacker-news</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/paved-with-intent-roadtools-and-nation-state-tactics-in-the-rwgfz/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-22T13:00:24+03:00</news:publication_date>
      <news:title>ROADtools Misused by Nation-States in Cloud Intrusions</news:title><news:keywords>threat-intel, apt, malware, research, cloud, tools</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/first-vpn-cybercrime-service-disrupted-administrator-arre-paajp/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-22T12:24:22+03:00</news:publication_date>
      <news:title>First VPN Cybercrime Service Disrupted, Administrator Arrested</news:title><news:keywords>threat-intel, vulnerability, malware, ransomware</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-9011/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-22T12:16:33+03:00</news:publication_date>
      <news:title>WordPress Ditty Plugin: Authorization Bypass Exposes Non-Public Content</news:title><news:keywords>vulnerability, cve, high-severity, cwe-862</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-8692/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-22T12:16:33+03:00</news:publication_date>
      <news:title>CVE-2026-8692 — The Vedrixa Forms – User Registration Form, Signup Form &amp;</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-862</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-8684/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-22T12:16:33+03:00</news:publication_date>
      <news:title>CVE-2026-8684 — The MotoPress Hotel Booking plugin for WordPress is</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-862</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-8679/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-22T12:16:32+03:00</news:publication_date>
      <news:title>CVE-2026-8679: WordPress AudioIgniter Plugin Exposes Playlist Data</news:title><news:keywords>vulnerability, cve, high-severity, cwe-639</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-8381/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-22T12:16:32+03:00</news:publication_date>
      <news:title>CVE-2026-8381 — A broken access control vulnerability exists in the</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-862</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7798/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-22T12:16:32+03:00</news:publication_date>
      <news:title>CVE-2026-7798 — Server-Side Request Forgery</news:title><news:keywords>vulnerability, cve, medium-severity, server-side-request-forgery, cwe-918</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7636/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-22T12:16:32+03:00</news:publication_date>
      <news:title>CVE-2026-7636 — The Slider by Soliloquy – Responsive Image Slider for</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-200</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7615/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-22T12:16:32+03:00</news:publication_date>
      <news:title>CVE-2026-7615 — The Widget Context plugin for WordPress is vulnerable to</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-352</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/kimwolf-ddos-botnet-operator-arrested-in-canada-over-ddos-fo-q0w3w/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-22T11:50:18+03:00</news:publication_date>
      <news:title>Kimwolf DDoS Botnet Operator Arrested in Canada</news:title><news:keywords>threat-intel, vulnerability, malware</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/grafana-says-codebase-and-other-data-stolen-via-tanstack-sup-pmbhp/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-22T10:49:38+03:00</news:publication_date>
      <news:title>Grafana Codebase Stolen via Unrotated Token in TanStack Supply Chain Attack</news:title><news:keywords>threat-intel, vulnerability, tools</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-9104/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-22T08:16:28+03:00</news:publication_date>
      <news:title>CVE-2026-9104 — Cross-Site Scripting (XSS)</news:title><news:keywords>vulnerability, cve, medium-severity, cross-site-scripting-xss, cwe-79</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-9018/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-22T08:16:28+03:00</news:publication_date>
      <news:title>CVE-2026-9018: Easy Elements WordPress Plugin Privilege Escalation</news:title><news:keywords>vulnerability, cve, high-severity, privilege-escalation, cwe-269</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7509/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-22T08:16:27+03:00</news:publication_date>
      <news:title>CVE-2026-7509 — Cross-Site Scripting (XSS)</news:title><news:keywords>vulnerability, cve, medium-severity, cross-site-scripting-xss, cwe-79</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7249/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-22T08:16:27+03:00</news:publication_date>
      <news:title>CVE-2026-7249 — The Location Weather plugin for WordPress is vulnerable to</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-862</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6864/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-22T08:16:27+03:00</news:publication_date>
      <news:title>CVE-2026-6864 — Cross-Site Scripting (XSS)</news:title><news:keywords>vulnerability, cve, medium-severity, cross-site-scripting-xss, cwe-79</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-4070/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-22T08:16:27+03:00</news:publication_date>
      <news:title>CVE-2026-4070 — The Alfie – Feed Plugin plugin for WordPress is vulnerable</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-352</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-44409/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-22T08:16:26+03:00</news:publication_date>
      <news:title>CVE-2026-44409 — Information Disclosure</news:title><news:keywords>vulnerability, cve, medium-severity, information-disclosure, cwe-200</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-3481/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-22T08:16:25+03:00</news:publication_date>
      <news:title>CVE-2026-3481 — Cross-Site Scripting (XSS)</news:title><news:keywords>vulnerability, cve, medium-severity, cross-site-scripting-xss, cwe-79</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-2518/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-22T08:16:24+03:00</news:publication_date>
      <news:title>CVE-2026-2518 — The FastX theme for WordPress is vulnerable to unauthorized</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-862</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1542954397-4606/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-22T07:30:04+03:00</news:publication_date>
      <news:title>GitHub Breached: Supply Chain Attack on Nx Console Compromises Internal Repos</news:title><news:keywords>malware, tools</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-4834/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-22T07:16:26+03:00</news:publication_date>
      <news:title>WP ERP Pro SQL Injection (CVE-2026-4834) Exposes Sensitive Data</news:title><news:keywords>vulnerability, cve, high-severity, sql-injection, cwe-89</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-34911/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-22T05:16:34+03:00</news:publication_date>
      <news:title>UniFi OS Path Traversal (CVE-2026-34911) Puts System Files at Risk</news:title><news:keywords>vulnerability, cve, high-severity, path-traversal, cwe-22</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-34910/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-22T05:16:34+03:00</news:publication_date>
      <news:title>UniFi OS Critical Command Injection (CVE-2026-34910) Demands Immediate Attention</news:title><news:keywords>vulnerability, cve, critical, high-severity, command-injection, cwe-20</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-34909/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-22T05:16:34+03:00</news:publication_date>
      <news:title>UniFi OS Critical Path Traversal Vulnerability (CVE-2026-34909)</news:title><news:keywords>vulnerability, cve, critical, high-severity, path-traversal, cwe-22</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-34908/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-22T05:16:34+03:00</news:publication_date>
      <news:title>UniFi OS Critical Improper Access Control Vulnerability: CVE-2026-34908</news:title><news:keywords>vulnerability, cve, critical, high-severity, improper-access-control, cwe-284</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-33000/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-22T05:16:33+03:00</news:publication_date>
      <news:title>UniFi OS Critical Command Injection (CVE-2026-33000)</news:title><news:keywords>vulnerability, cve, critical, high-severity, command-injection, cwe-20</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6960/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-22T01:16:48+03:00</news:publication_date>
      <news:title>BookingPress Pro Plugin: Critical RCE via Unauthenticated File Upload</news:title><news:keywords>vulnerability, cve, critical, high-severity, remote-code-execution, cwe-434</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-22678/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-22T01:16:46+03:00</news:publication_date>
      <news:title>CVE-2026-22678 — The Email Template Description Field Of The System And Serve Cross-Site Scripting (XSS)</news:title><news:keywords>vulnerability, cve, medium-severity, cross-site-scripting-xss, cwe-79</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-47102/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-22T00:16:32+03:00</news:publication_date>
      <news:title>LiteLLM Privilege Escalation: User Role Manipulation Grants Admin Access (CVE-2026-47102)</news:title><news:keywords>vulnerability, cve, high-severity, cwe-863</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-47101/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-22T00:16:32+03:00</news:publication_date>
      <news:title>LiteLLM Privilege Escalation Via API Key Misconfiguration (CVE-2026-47101)</news:title><news:keywords>vulnerability, cve, high-severity, privilege-escalation, cwe-863</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-4843/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-21T23:16:14+03:00</news:publication_date>
      <news:title>CVE-2026-4843 — The GSheet For Woo Importer plugin for WordPress is</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-862</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-47114/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-21T23:16:14+03:00</news:publication_date>
      <news:title>IINA CVE-2026-47114: macOS Command Execution via Malicious URL</news:title><news:keywords>vulnerability, cve, high-severity, cwe-88</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/daily-digest/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-21T23:00:00+03:00</news:publication_date>
      <news:title>Daily Security Digest — 2026-05-21</news:title><news:keywords>daily-digest, vulnerability, cve, critical, high-severity, buffer-overflow, cwe-122, sql-injection, cwe-89, cwe-121</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/tech-giants-promise-british-regulator-they-will-tweak-platfo-6lxcl/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-21T22:01:00+03:00</news:publication_date>
      <news:title>Tech Giants Commit to UK Child Safety Tweaks for Ofcom</news:title><news:keywords>threat-intel, data-breach, government</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-48247/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-21T21:16:21+03:00</news:publication_date>
      <news:title>CVE-2026-48247 — Open ISES Tickets before 3.44.2 disables TLS certificate</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-295</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-48246/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-21T21:16:21+03:00</news:publication_date>
      <news:title>CVE-2026-48246 — Open ISES Tickets before 3.44.2 disables TLS certificate</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-295</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-48242/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-21T21:16:21+03:00</news:publication_date>
      <news:title>Open ISES Tickets CVE-2026-48242: Hardcoded MySQL Credentials Exposed</news:title><news:keywords>vulnerability, cve, high-severity, cwe-798</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-48241/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-21T21:16:21+03:00</news:publication_date>
      <news:title>CVE-2026-48241: Hardcoded MySQL Credentials in Open ISES Tickets Expose Data</news:title><news:keywords>vulnerability, cve, high-severity, cwe-798</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-48240/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-21T21:16:20+03:00</news:publication_date>
      <news:title>Open ISES Tickets SQLi: Authenticated Attackers Can Destroy Database Content</news:title><news:keywords>vulnerability, cve, high-severity, sql-injection, cwe-89</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-48239/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-21T21:16:20+03:00</news:publication_date>
      <news:title>Open ISES Tickets SQL Injection (CVE-2026-48239) Allows Database Manipulation</news:title><news:keywords>vulnerability, cve, high-severity, sql-injection, cwe-89</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-48238/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-21T21:16:20+03:00</news:publication_date>
      <news:title>Open ISES Tickets SQLi: Authenticated Attackers Can Corrupt Databases</news:title><news:keywords>vulnerability, cve, high-severity, sql-injection, cwe-89</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-48237/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-21T21:16:20+03:00</news:publication_date>
      <news:title>Open ISES Tickets SQLi: Authenticated Attackers Can Destroy Database</news:title><news:keywords>vulnerability, cve, high-severity, sql-injection, cwe-89</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-48236/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-21T21:16:20+03:00</news:publication_date>
      <news:title>Open ISES Tickets SQL Injection (CVE-2026-48236) Exposes Databases</news:title><news:keywords>vulnerability, cve, high-severity, sql-injection, cwe-89</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-48235/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-21T21:16:20+03:00</news:publication_date>
      <news:title>CVE-2026-48235: SQLi in Open ISES Tickets via GPS Data</news:title><news:keywords>vulnerability, cve, high-severity, sql-injection, cwe-89</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-48234/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-21T21:16:20+03:00</news:publication_date>
      <news:title>Open ISES Tickets SQL Injection Vulnerability (CVE-2026-48234)</news:title><news:keywords>vulnerability, cve, high-severity, sql-injection, cwe-89</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-48233/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-21T21:16:20+03:00</news:publication_date>
      <news:title>Open ISES Tickets CVE-2026-48233: SQL Injection Exposes Database</news:title><news:keywords>vulnerability, cve, high-severity, sql-injection, cwe-89</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-48232/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-21T21:16:19+03:00</news:publication_date>
      <news:title>Open ISES Tickets SQL Injection (CVE-2026-48232) Allows Data Manipulation</news:title><news:keywords>vulnerability, cve, high-severity, sql-injection, cwe-89</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-48231/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-21T21:16:19+03:00</news:publication_date>
      <news:title>Open ISES Tickets SQLi: Authenticated Attackers Can Corrupt Databases</news:title><news:keywords>vulnerability, cve, high-severity, sql-injection, cwe-89</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-39593/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-21T21:16:17+03:00</news:publication_date>
      <news:title>CVE-2026-39593 — VillaTheme HAPPY Vulnerability</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-862</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/google-accidentally-exposed-details-of-unfixed-chromium-flaw-zg4ik/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-21T21:13:50+03:00</news:publication_date>
      <news:title>Google Accidentally Exposes Chromium RCE Flaw Details</news:title><news:keywords>threat-intel, data-breach, malware</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/two-americans-plead-guilty-to-assisting-india-based-tech-sup-kvvko/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-21T21:02:00+03:00</news:publication_date>
      <news:title>US Citizens Plead Guilty to Aiding India-Based Tech Support Scams</news:title><news:keywords>threat-intel, data-breach, government, tools</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-48213/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-21T20:16:22+03:00</news:publication_date>
      <news:title>CVE-2026-48213 — Add.Php That Cross-Site Scripting (XSS)</news:title><news:keywords>vulnerability, cve, medium-severity, cross-site-scripting-xss, cwe-79</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-9089/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-21T19:16:23+03:00</news:publication_date>
      <news:title>ConnectWise Automate Agent Fails Plugin Verification, CVSS 8.8</news:title><news:keywords>vulnerability, cve, high-severity, cwe-494</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-39531/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-21T19:16:23+03:00</news:publication_date>
      <news:title>CVE-2026-39531: WP Directory Kit Blind SQL Injection Flaw Rated Critical</news:title><news:keywords>vulnerability, cve, critical, high-severity, sql-injection, cwe-89</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-1816/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-21T18:16:22+03:00</news:publication_date>
      <news:title>CVE-2026-1816 — Turkiye Electricity Transmission Corporation (TEİAŞ) Mobile  Vulnerability</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-307</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-1815/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-21T18:16:22+03:00</news:publication_date>
      <news:title>CVE-2026-1815 — Turkiye Electricity Transmission Corporation (TEİAŞ) Mobile  Vulnerability</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-613</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/uk-plans-for-cybercrime-law-reform-would-protect-almost-no-o-bph85/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-21T17:47:00+03:00</news:publication_date>
      <news:title>UK Cybercrime Law Reform Threatens Vulnerability Research</news:title><news:keywords>threat-intel, data-breach, government, vulnerability</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/showboat-linux-malware-hits-middle-east-telecom-with-socks5-c13t6/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-21T17:17:09+03:00</news:publication_date>
      <news:title>Showboat Linux Malware Targets Middle East Telecom with SOCKS5 Proxy</news:title><news:keywords>threat-intel, vulnerability, malware, tools</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-45208/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-21T17:16:48+03:00</news:publication_date>
      <news:title>CVE-2026-45208: Apex One/SEP Agent Vulnerability Allows Local Privilege Escalation</news:title><news:keywords>vulnerability, cve, high-severity, cwe-367</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-45207/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-21T17:16:48+03:00</news:publication_date>
      <news:title>CVE-2026-45207: Apex One/SEP Agent Privilege Escalation</news:title><news:keywords>vulnerability, cve, high-severity, cwe-346</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-45206/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-21T17:16:47+03:00</news:publication_date>
      <news:title>CVE-2026-45206: Privilege Escalation in Apex One/SEP Agent</news:title><news:keywords>vulnerability, cve, high-severity, cwe-346</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-34930/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-21T17:16:45+03:00</news:publication_date>
      <news:title>CVE-2026-34930: Trend Micro Apex One/SEP Agent Privilege Escalation</news:title><news:keywords>vulnerability, cve, high-severity, cwe-346</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-34929/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-21T17:16:45+03:00</news:publication_date>
      <news:title>CVE-2026-34929: Trend Micro Apex One/SEP Agent Privilege Escalation</news:title><news:keywords>vulnerability, cve, high-severity, cwe-346</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-34928/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-21T17:16:45+03:00</news:publication_date>
      <news:title>CVE-2026-34928: Trend Micro Apex One/SEP Agent Privilege Escalation</news:title><news:keywords>vulnerability, cve, high-severity, cwe-346</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-34927/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-21T17:16:45+03:00</news:publication_date>
      <news:title>CVE-2026-34927: Trend Micro Apex One/SEP Agent Local Privilege Escalation</news:title><news:keywords>vulnerability, cve, high-severity, cwe-346</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-34926/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-21T17:16:45+03:00</news:publication_date>
      <news:title>CVE-2026-34926 — The Apex One (On-Premise) Server Path Traversal</news:title><news:keywords>vulnerability, cve, medium-severity, path-traversal, cwe-23</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-2740/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-21T17:16:44+03:00</news:publication_date>
      <news:title>Zohocorp ManageEngine RCE in ADSelfService Plus, DataSecurity Plus, RecoveryManager Plus</news:title><news:keywords>vulnerability, cve, high-severity, remote-code-execution, cwe-77</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2025-71213/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-21T17:16:43+03:00</news:publication_date>
      <news:title>Trend Micro Apex One CVE-2025-71213: Local Privilege Escalation Risk</news:title><news:keywords>vulnerability, cve, high-severity, cwe-346</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2025-71212/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-21T17:16:43+03:00</news:publication_date>
      <news:title>Trend Micro Apex One Vulnerability Allows Local Privilege Escalation</news:title><news:keywords>vulnerability, cve, high-severity, cwe-59</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2025-71211/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-21T17:16:43+03:00</news:publication_date>
      <news:title>Trend Micro Apex One Console Vulnerability Allows Remote Code Execution</news:title><news:keywords>vulnerability, cve, critical, high-severity, cwe-22</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2025-71210/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-21T17:16:43+03:00</news:publication_date>
      <news:title>Trend Micro Apex One Console RCE (CVE-2025-71210) — Patch Now</news:title><news:keywords>vulnerability, cve, critical, high-severity, cwe-22</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2025-13479/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-21T17:16:43+03:00</news:publication_date>
      <news:title>PosCube QR Menu: Authorization Bypass via User-Controlled Key (CVE-2025-13479)</news:title><news:keywords>vulnerability, cve, high-severity, cwe-639</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2025-13477/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-21T17:16:43+03:00</news:publication_date>
      <news:title>CVE-2025-13477: WifiBurada Authentication Bypass Exposes Private Data</news:title><news:keywords>vulnerability, cve, high-severity, authentication-bypass, cwe-359, cwe-522</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/inside-a-crypto-drainer-how-to-spot-it-before-it-empties-yo-swdre/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-21T17:00:10+03:00</news:publication_date>
      <news:title>Crypto Drainers Scale Wallet Theft via Phishing and Automation</news:title><news:keywords>threat-intel, data-breach, malware, phishing, bleepingcomputer</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-5118/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-21T16:16:20+03:00</news:publication_date>
      <news:title>Divi Form Builder Privilege Escalation: Unauthenticated Admin Account Creation</news:title><news:keywords>vulnerability, cve, critical, high-severity, privilege-escalation, cwe-269</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/police-seize-first-vpn-service-used-in-ransomware-data-th-5fshx/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-21T16:09:51+03:00</news:publication_date>
      <news:title>Law Enforcement Seizes &apos;First VPN&apos; Service Used in Ransomware, Data Theft</news:title><news:keywords>threat-intel, data-breach, malware, ransomware, bleepingcomputer</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/cisco-patches-critical-vulnerability-in-secure-workload-3b5qv/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-21T15:04:13+03:00</news:publication_date>
      <news:title>Cisco Patches Critical Secure Workload API Vulnerability</news:title><news:keywords>threat-intel, vulnerability, identity</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1427288221-8967/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-21T15:01:37+03:00</news:publication_date>
      <news:title>TeamPCP Interview Reveals Motives: Anti-Establishment, Not Ideological</news:title><news:keywords>israel, data-breach, threat-intel, tools</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/cisa-kev-CVE-2025-34291/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-21T15:00:00+03:00</news:publication_date>
      <news:title>CVE-2025-34291 — Langflow Langflow: Langflow Origin Validation Error Vulnerability</news:title><news:keywords>vulnerability, cve, cisa-kev, actively-exploited</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/threatsday-bulletin-linux-rootkits-router-0-day-ai-intrus-n6m5z/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-21T14:52:14+03:00</news:publication_date>
      <news:title>Attackers Exploit Trusted Components: A New Era of Stealth</news:title><news:keywords>threat-intel, vulnerability, cloud, tools, the-hacker-news</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/apple-rejected-2-million-app-store-submissions-in-2025-for-s-vuxt8/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-21T14:17:15+03:00</news:publication_date>
      <news:title>Apple Rejected 2 Million App Store Submissions for Security and Fraud Prevention</news:title><news:keywords>threat-intel, vulnerability</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/flipper-one-project-needs-community-help-to-build-open-linux-7i42e/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-21T14:00:00+03:00</news:publication_date>
      <news:title>Flipper Devices Seeks Community for Flipper One Linux Platform</news:title><news:keywords>threat-intel, data-breach, malware, tools</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/when-identity-is-the-attack-path-7rspt/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-21T13:30:00+03:00</news:publication_date>
      <news:title>Cached AWS Access Keys: A Cloud Identity Attack Path</news:title><news:keywords>threat-intel, vulnerability, cloud, microsoft, identity</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1373735086-5042/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-21T13:19:04+03:00</news:publication_date>
      <news:title>New Breaches Expose Sensitive Business Data, PII for Targeted Attacks</news:title><news:keywords>darkweb, threat-intel, ransomware, vulnerability, data-breach</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-42396/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-21T13:16:25+03:00</news:publication_date>
      <news:title>CVE-2026-42396 — Insufficient Validation of Member Zone Data May Cause</news:title><news:keywords>vulnerability, cve, medium-severity</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-42002/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-21T13:16:25+03:00</news:publication_date>
      <news:title>CVE-2026-42002 — Concurrency and locking defects in</news:title><news:keywords>vulnerability, cve, medium-severity</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-42001/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-21T13:16:25+03:00</news:publication_date>
      <news:title>CVE-2026-42001: Autoprimary SOA Queries Vulnerability</news:title><news:keywords>vulnerability, cve, high-severity</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-42000/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-21T13:16:25+03:00</news:publication_date>
      <news:title>CVE-2026-42000 — Insufficient Validation of Names During</news:title><news:keywords>vulnerability, cve, medium-severity</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41999/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-21T13:16:25+03:00</news:publication_date>
      <news:title>CVE-2026-41999 — Incorrect Behaviour of Views with TCP PROXY</news:title><news:keywords>vulnerability, cve, medium-severity</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-28764/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-21T13:16:25+03:00</news:publication_date>
      <news:title>MediaInfoLib LXF Parsing Heap Overflow: High-Severity Vulnerability Disclosed</news:title><news:keywords>vulnerability, cve, high-severity, buffer-overflow, cwe-823</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1427288221-8966/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-21T12:42:55+03:00</news:publication_date>
      <news:title>Microsoft Patches YellowKey: Public PoC Violates Disclosure</news:title><news:keywords>israel, vulnerability, microsoft</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/google-s-surge-in-chrome-vulnerability-discoveries-likely-dr-rbzlu/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-21T12:37:08+03:00</news:publication_date>
      <news:title>Google Chrome Vulnerability Surge Suggests AI&apos;s Role in Discovery</news:title><news:keywords>threat-intel, vulnerability, tools</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1542954397-4605/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-21T12:30:04+03:00</news:publication_date>
      <news:title>DOJ, FBI Crack Down on AI Deepfake Pornography Under &apos;Take It Down Act&apos;</news:title><news:keywords></news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-9157/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-21T12:16:30+03:00</news:publication_date>
      <news:title>Gmission Web Fax Vulnerability (CVE-2026-9157) Allows Remote Code Inclusion</news:title><news:keywords>vulnerability, cve, high-severity, unrestricted-file-upload, cwe-20, cwe-434</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-5434/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-21T12:16:30+03:00</news:publication_date>
      <news:title>CVE-2026-5434 — Honeywell Control Network Module (CNM) contains insertion</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-538</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-5433/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-21T12:16:30+03:00</news:publication_date>
      <news:title>Honeywell Control Network Module: Critical RCE Vulnerability Discovered</news:title><news:keywords>vulnerability, cve, critical, high-severity, remote-code-execution</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-4858/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-21T12:16:30+03:00</news:publication_date>
      <news:title>Mattermost Path Traversal Allows API Calls with Admin Token</news:title><news:keywords>vulnerability, cve, high-severity, path-traversal, cwe-22</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-27393/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-21T12:16:26+03:00</news:publication_date>
      <news:title>CVE-2026-27393 — Tobias CF7 WOW Styler Vulnerability</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-862</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-27349/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-21T12:16:26+03:00</news:publication_date>
      <news:title>CVE-2026-27349 — WPFunnels Team Mail Mint Vulnerability</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-497</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-22880/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-21T12:16:26+03:00</news:publication_date>
      <news:title>CVE-2026-22880 — Mattermost Mobile Apps versions &lt;=2.37 11.4 2.0.37 11.0.4</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-352</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-44076/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-21T11:16:23+03:00</news:publication_date>
      <news:title>CVE-2026-44076 — In Netatalk 3.1.0 through 4.4.2, shell injection via volume</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-78</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-44068/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-21T11:16:22+03:00</news:publication_date>
      <news:title>Netatalk Path Traversal (CVE-2026-44068) Poses High Risk</news:title><news:keywords>vulnerability, cve, high-severity, path-traversal, cwe-22</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-44066/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-21T11:16:22+03:00</news:publication_date>
      <news:title>CVE-2026-44066: Netatalk Heap Out-of-Bounds Read Poses High Risk</news:title><news:keywords>vulnerability, cve, high-severity, out-of-bounds-1, cwe-125</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-44064/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-21T11:16:22+03:00</news:publication_date>
      <news:title>Netatalk CVE-2026-44064: Out-of-Bounds Access Poses High Risk</news:title><news:keywords>vulnerability, cve, high-severity, cwe-125</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-44062/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-21T11:16:21+03:00</news:publication_date>
      <news:title>Netatalk CVE-2026-44062: High-Severity RCE Risk in Legacy File Sharing</news:title><news:keywords>vulnerability, cve, high-severity, cwe-787</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-44060/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-21T11:16:21+03:00</news:publication_date>
      <news:title>CVE-2026-44060: Netatalk DoS Vulnerability Poses High Risk</news:title><news:keywords>vulnerability, cve, high-severity, denial-of-service, cwe-191</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-44058/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-21T11:16:21+03:00</news:publication_date>
      <news:title>Netatalk Authentication Bypass (CVE-2026-44058) Allows Admin Access</news:title><news:keywords>vulnerability, cve, high-severity, authentication-bypass, cwe-287</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-44055/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-21T11:16:21+03:00</news:publication_date>
      <news:title>Netatalk CVE-2026-44055: Shell Injection Vulnerability Disclosed</news:title><news:keywords>vulnerability, cve, high-severity, cwe-78</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-44053/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-21T11:16:20+03:00</news:publication_date>
      <news:title>CVE-2026-44053: Netatalk dhcast128 Weak Crypto Exposes File Shares</news:title><news:keywords>vulnerability, cve, high-severity, cwe-327</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-44052/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-21T11:16:20+03:00</news:publication_date>
      <news:title>CVE-2026-44052: Netatalk Exposes LDAP Passwords in Logs</news:title><news:keywords>vulnerability, cve, high-severity, cwe-532</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-44051/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-21T11:16:20+03:00</news:publication_date>
      <news:title>Netatalk Arbitrary File Read (CVE-2026-44051) Poses High Risk</news:title><news:keywords>vulnerability, cve, high-severity, arbitrary-file-access, cwe-59</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-44050/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-21T11:16:20+03:00</news:publication_date>
      <news:title>Netatalk Heap Buffer Overflow (CVE-2026-44050) — Critical RCE Risk</news:title><news:keywords>vulnerability, cve, critical, high-severity, buffer-overflow, cwe-122</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-44049/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-21T11:16:20+03:00</news:publication_date>
      <news:title>CVE-2026-44049: Netatalk Out-of-Bounds Write Poses High Risk</news:title><news:keywords>vulnerability, cve, high-severity, out-of-bounds-1, cwe-787</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-44048/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-21T11:16:20+03:00</news:publication_date>
      <news:title>Netatalk Stack Buffer Overflow (CVE-2026-44048) Poses High Risk</news:title><news:keywords>vulnerability, cve, high-severity, buffer-overflow, cwe-121</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-44047/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-21T11:16:20+03:00</news:publication_date>
      <news:title>Netatalk SQL Injection (CVE-2026-44047) Poses High Risk</news:title><news:keywords>vulnerability, cve, high-severity, sql-injection, cwe-89</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/microsoft-warns-of-new-defender-zero-days-exploited-in-attac-eiqxs/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-21T10:49:48+03:00</news:publication_date>
      <news:title>Microsoft Defender Zero-Days Under Active Exploitation</news:title><news:keywords>threat-intel, data-breach, malware, vulnerability, microsoft</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/9-year-old-linux-kernel-flaw-enables-root-command-execution-7f38n/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-21T10:35:53+03:00</news:publication_date>
      <news:title>Linux Kernel Flaw CVE-2026-46333 Allows Root Command Execution</news:title><news:keywords>threat-intel, vulnerability, the-hacker-news</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1427288221-8964/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-21T10:02:58+03:00</news:publication_date>
      <news:title>Ukrainian Teen Arrested for $721K Infostealer Operation Targeting US</news:title><news:keywords>israel, malware</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1427288221-8959/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-21T09:55:21+03:00</news:publication_date>
      <news:title>Operation Ramz: INTERPOL Arrests 201 Cybercriminals in MENA Region</news:title><news:keywords>israel</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/github-links-repo-breach-to-tanstack-npm-supply-chain-attack-13d14/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-21T09:54:01+03:00</news:publication_date>
      <news:title>GitHub Repo Breach Linked to TanStack npm Supply Chain Attack</news:title><news:keywords>threat-intel, data-breach, malware, tools</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6279/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-21T08:16:23+03:00</news:publication_date>
      <news:title>Avada Builder RCE (CVE-2026-6279) Exposes WordPress Sites</news:title><news:keywords>vulnerability, cve, critical, high-severity, remote-code-execution, cwe-74</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-2734/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-21T08:16:22+03:00</news:publication_date>
      <news:title>CVE-2026-2734 — In mlflow/mlflow versions up to 3.9.0, the</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-284</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-1543/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-21T08:16:22+03:00</news:publication_date>
      <news:title>CVE-2026-1543 — Cross-Site Scripting (XSS)</news:title><news:keywords>vulnerability, cve, medium-severity, cross-site-scripting-xss, cwe-79</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/dragonica-lunaris-126-293-breached-accounts-lzbup/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-21T07:41:32+03:00</news:publication_date>
      <news:title>Dragonica Lunaris Breach Exposes 126K Player Accounts</news:title><news:keywords>data-breach</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-4811/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-21T07:16:31+03:00</news:publication_date>
      <news:title>CVE-2026-4811 — Cross-Site Scripting (XSS)</news:title><news:keywords>vulnerability, cve, medium-severity, cross-site-scripting-xss, cwe-79</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/windows93-myspace93-46-105-breached-accounts-nasew/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-21T06:45:15+03:00</news:publication_date>
      <news:title>Windows93 / Myspace93 Breach Exposes 46K Accounts in Plaintext</news:title><news:keywords>data-breach, vulnerability, microsoft</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/highly-critical-drupal-core-flaw-exposes-postgresql-sites-to-j9qzr/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-21T06:44:11+03:00</news:publication_date>
      <news:title>Drupal Core RCE Flaw (CVE-2026-9082) Impacts PostgreSQL Sites</news:title><news:keywords>threat-intel, vulnerability, tools</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-1881/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-21T05:16:32+03:00</news:publication_date>
      <news:title>CVE-2026-1881 — The Broadstreet plugin for WordPress is vulnerable to</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-639</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-9149/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-21T03:16:35+03:00</news:publication_date>
      <news:title>CVE-2026-9149 — Libsolv Buffer Overflow</news:title><news:keywords>vulnerability, cve, medium-severity, buffer-overflow, cwe-122</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-40165/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-21T03:16:28+03:00</news:publication_date>
      <news:title>authentik Authentication Bypass: SAML NameID XML Comment Injection (CVE-2026-40165)</news:title><news:keywords>vulnerability, cve, high-severity, authentication-bypass, cwe-91, cwe-287, cwe-436</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-9150/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-21T02:16:36+03:00</news:publication_date>
      <news:title>CVE-2026-9150 — Libsolv Buffer Overflow</news:title><news:keywords>vulnerability, cve, medium-severity, buffer-overflow, cwe-121</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/xi-and-putin-pledge-closer-cooperation-on-ai-cyberspace-and-43246/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-21T02:00:00+03:00</news:publication_date>
      <news:title>China and Russia Forge Deeper Cyber, AI, and Satellite Cooperation</news:title><news:keywords>threat-intel, data-breach, government</news:keywords>
    </news:news>
  </url></urlset>
