<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9"
        xmlns:news="http://www.google.com/schemas/sitemap-news/0.9"><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7002/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-26T01:16:19+03:00</news:publication_date>
      <news:title>CVE-2026-7002: KLiK SocialMediaWebsite SQLi Poses Remote Risk</news:title><news:keywords>vulnerability, cve, high-severity, sql-injection, cwe-74, cwe-89</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/daily-digest/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-25T23:00:00+03:00</news:publication_date>
      <news:title>Daily Security Digest — 2026-04-25</news:title><news:keywords>daily-digest, vulnerability, cve, high-severity, buffer-overflow, cwe-119, cwe-120, command-injection, cwe-77, cwe-78</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1427288221-8815/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-25T22:38:30+03:00</news:publication_date>
      <news:title>Rituals Cosmetics Suffers Data Breach, Customer PII Exposed</news:title><news:keywords>israel</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6994/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-25T22:16:00+03:00</news:publication_date>
      <news:title>CVE-2026-6994 — A weakness has been identified in Envoy up to 1.33.0.</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-74, cwe-707</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6993/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-25T22:16:00+03:00</news:publication_date>
      <news:title>CVE-2026-6993 — Go-Kratos Kratos Vulnerability</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-441</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6992/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-25T21:16:19+03:00</news:publication_date>
      <news:title>Linksys MR9600 RCE: Critical OS Command Injection Vulnerability</news:title><news:keywords>vulnerability, cve, high-severity, command-injection, cwe-77, cwe-78</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6991/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-25T21:16:19+03:00</news:publication_date>
      <news:title>CVE-2026-6991 — SQL Injection</news:title><news:keywords>vulnerability, cve, medium-severity, sql-injection, cwe-74, cwe-89</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6989/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-25T21:16:18+03:00</news:publication_date>
      <news:title>CVE-2026-6989 — Tenda F453 Command Injection</news:title><news:keywords>vulnerability, cve, medium-severity, command-injection, cwe-74, cwe-77</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6988/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-25T21:16:17+03:00</news:publication_date>
      <news:title>Tenda HG10 Router Buffer Overflow (CVE-2026-6988) Exposes Remote Attack</news:title><news:keywords>vulnerability, cve, high-severity, buffer-overflow, cwe-119, cwe-120</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6987/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-25T20:16:33+03:00</news:publication_date>
      <news:title>CVE-2026-6987: PicoClaw Web Launcher Command Injection</news:title><news:keywords>vulnerability, cve, high-severity, command-injection, cwe-74, cwe-77</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6985/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-25T20:16:33+03:00</news:publication_date>
      <news:title>CVE-2026-6985 — The Function Handle_opt Of The File /Src/Net_builtin.C Of Th Vulnerability</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-404, cwe-835</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6984/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-25T19:16:17+03:00</news:publication_date>
      <news:title>CVE-2026-6984 — AstrBotDevs AstrBot Vulnerability</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-791, cwe-1336</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6983/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-25T19:16:16+03:00</news:publication_date>
      <news:title>CVE-2026-6983 — Pagekit Server-Side Request Forgery</news:title><news:keywords>vulnerability, cve, medium-severity, server-side-request-forgery, cwe-918</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1373735086-4998/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-25T18:40:29+03:00</news:publication_date>
      <news:title>Legal Sector Under Siege: 31 Ransomware Attacks in Seven Days</news:title><news:keywords>darkweb, threat-intel, ransomware, malware, data-breach, darkfeed</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1373735086-4997/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-25T18:26:55+03:00</news:publication_date>
      <news:title>Global Payment Provider, Government Entity Hit in Major Data Leaks</news:title><news:keywords>darkweb, threat-intel, ransomware, vulnerability, data-breach</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6982/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-25T18:16:17+03:00</news:publication_date>
      <news:title>CVE-2026-6982 — SQL Injection</news:title><news:keywords>vulnerability, cve, medium-severity, sql-injection, cwe-74, cwe-89</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6981/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-25T18:16:17+03:00</news:publication_date>
      <news:title>CVE-2026-6981 — IhateCreatingUserNames2 AiraHub2 Server-Side Request Forgery</news:title><news:keywords>vulnerability, cve, medium-severity, server-side-request-forgery, cwe-918</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1542954397-4539/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-25T17:30:15+03:00</news:publication_date>
      <news:title>UK&apos;s NCSC Releases SilentGlass to Block Malicious Display Traffic</news:title><news:keywords></news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6980/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-25T17:16:00+03:00</news:publication_date>
      <news:title>CVE-2026-6980: Divyanshu-hash GitPilot-MCP Command Injection</news:title><news:keywords>vulnerability, cve, high-severity, command-injection, cwe-74, cwe-77</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6979/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-25T15:15:59+03:00</news:publication_date>
      <news:title>CVE-2026-6979 — Devlikeapro WAHA Server-Side Request Forgery</news:title><news:keywords>vulnerability, cve, medium-severity, server-side-request-forgery, cwe-918</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6978/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-25T15:15:59+03:00</news:publication_date>
      <news:title>CVE-2026-6978 — JiZhiCMS SQL Injection</news:title><news:keywords>vulnerability, cve, medium-severity, sql-injection, cwe-74, cwe-89</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6977/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-25T14:16:19+03:00</news:publication_date>
      <news:title>CVE-2026-6977: Vanna-AI Legacy Flask API Improper Authorization</news:title><news:keywords>vulnerability, cve, high-severity, cwe-266, cwe-285</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/researchers-uncover-pre-stuxnet-fast16-malware-targeting-e-xp1qr/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-25T12:26:00+03:00</news:publication_date>
      <news:title>Pre-Stuxnet &apos;fast16&apos; Malware Targeted Engineering Software in 2005</news:title><news:keywords>threat-intel, vulnerability, malware, tools</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6951/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-25T09:16:16+03:00</news:publication_date>
      <news:title>simple-git RCE: Incomplete Fix Leaves Critical Vulnerability Open</news:title><news:keywords>vulnerability, cve, critical, high-severity, remote-code-execution, cwe-94</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/adt-confirms-data-breach-after-shinyhunters-leak-threat-thhhr/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-25T01:53:14+03:00</news:publication_date>
      <news:title>ADT Confirms Data Breach After ShinyHunters Extortion Threat</news:title><news:keywords>threat-intel, data-breach, malware, ransomware</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-42171/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-25T01:16:01+03:00</news:publication_date>
      <news:title>CVE-2026-42171: NSIS Privilege Escalation Vulnerability</news:title><news:keywords>vulnerability, cve, high-severity, cwe-427</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/the-npm-threat-landscape-attack-surface-and-mitigations-8o65q/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-25T00:40:33+03:00</news:publication_date>
      <news:title>npm Supply Chain Evolves: Wormable Malware, CI/CD Persistence Detected</news:title><news:keywords>threat-intel, apt, malware, research</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41481/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-25T00:16:19+03:00</news:publication_date>
      <news:title>CVE-2026-41481 — Server-Side Request Forgery</news:title><news:keywords>vulnerability, cve, medium-severity, server-side-request-forgery, cwe-918</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41478/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-25T00:16:19+03:00</news:publication_date>
      <news:title>Saltcorn SQL Injection (CVE-2026-41478) Exposes Sensitive Data</news:title><news:keywords>vulnerability, cve, critical, high-severity, sql-injection, cwe-89</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41248/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-25T00:16:18+03:00</news:publication_date>
      <news:title>CVE-2026-41248: Clerk Auth Bypass Exposes Critical Web Applications</news:title><news:keywords>vulnerability, cve, critical, high-severity, cwe-436, cwe-863</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/firestarter-malware-survives-cisco-firewall-updates-securit-jd7v0/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T23:34:08+03:00</news:publication_date>
      <news:title>Cisco Firestarter Malware Persists Through Updates</news:title><news:keywords>threat-intel, data-breach, malware, vulnerability</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/tgr-sta-1030-new-activity-in-central-and-south-america-26fh7/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T23:30:19+03:00</news:publication_date>
      <news:title>TGR-STA-1030: Persistent Threat to Central and South America</news:title><news:keywords>threat-intel, apt, malware, research, microsoft</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/windows-update-gets-new-controls-to-reduce-forced-restarts-1g7ek/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T23:08:26+03:00</news:publication_date>
      <news:title>Microsoft Windows Update Gets New Controls to Reduce Forced Restarts</news:title><news:keywords>threat-intel, data-breach, malware, microsoft</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/daily-digest/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T23:00:00+03:00</news:publication_date>
      <news:title>Daily Security Digest — 2026-04-24</news:title><news:keywords>daily-digest, vulnerability, cve, high-severity, cwe-1321, cwe-113, cwe-183, cwe-441, cwe-918, critical</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41492/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T22:17:14+03:00</news:publication_date>
      <news:title>Dgraph CVE-2026-41492: Unauthenticated Admin Token Exposure Via /debug/vars</news:title><news:keywords>vulnerability, cve, critical, high-severity, cwe-200</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41421/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T22:17:13+03:00</news:publication_date>
      <news:title>CVE-2026-41421: SiYuan Desktop RCE via HTML Notification Abuse</news:title><news:keywords>vulnerability, cve, high-severity, code-execution, cwe-78, cwe-79</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41419/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T22:17:13+03:00</news:publication_date>
      <news:title>4ga Boards Path Traversal Vulnerability Exposes Local Files (CVE-2026-41419)</news:title><news:keywords>vulnerability, cve, high-severity, path-traversal, cwe-22</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41418/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T22:17:13+03:00</news:publication_date>
      <news:title>CVE-2026-41418 — 4ga Boards is a boards system for realtime project</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-208</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41414/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T22:17:13+03:00</news:publication_date>
      <news:title>CVE-2026-41414: Skim Fuzzy Finder Vulnerability Exposes GitHub Tokens</news:title><news:keywords>vulnerability, cve, high-severity, cwe-94</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41328/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T22:17:12+03:00</news:publication_date>
      <news:title>Dgraph CVE-2026-41328: Unauthenticated Data Read Access Critical Flaw</news:title><news:keywords>vulnerability, cve, critical, high-severity, cwe-943</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41327/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T22:17:12+03:00</news:publication_date>
      <news:title>CVE-2026-41327: Dgraph GraphQL Database Critical Unauthenticated Data Read</news:title><news:keywords>vulnerability, cve, critical, high-severity, cwe-943</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-33666/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T22:17:10+03:00</news:publication_date>
      <news:title>CVE-2026-33666: Zserio BitStreamReader Overflow Bypasses Bounds Check</news:title><news:keywords>vulnerability, cve, high-severity, cwe-190</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-33662/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T22:17:09+03:00</news:publication_date>
      <news:title>CVE-2026-33662: OP-TEE RSA Padding Underflow Leads to Crash</news:title><news:keywords>vulnerability, cve, high-severity, cwe-190</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-33524/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T22:17:09+03:00</news:publication_date>
      <news:title>Zserio DoS: Crafted Payload Triggers Massive Memory Allocation</news:title><news:keywords>vulnerability, cve, high-severity, denial-of-service, cwe-789</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/iran-s-cyber-threat-may-be-less-shock-and-awe-than-low-an-fpsjf/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T22:15:00+03:00</news:publication_date>
      <news:title>Iran Cyber Threat: Low-and-Slow Opportunism, Not &apos;Shock and Awe&apos;</news:title><news:keywords>threat-intel, data-breach, government</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/adt-says-customer-data-stolen-in-cyber-intrusion-jcwup/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T21:45:00+03:00</news:publication_date>
      <news:title>ADT Customer Data Stolen in Cyber Intrusion</news:title><news:keywords>threat-intel, data-breach, government</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-42044/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T21:16:31+03:00</news:publication_date>
      <news:title>CVE-2026-42044 — Privilege Escalation</news:title><news:keywords>vulnerability, cve, medium-severity, privilege-escalation, cwe-915, cwe-1321</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-42043/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T21:16:31+03:00</news:publication_date>
      <news:title>Axios CVE-2026-42043: NO_PROXY Bypass Vulnerability</news:title><news:keywords>vulnerability, cve, high-severity, cwe-183, cwe-441, cwe-918</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-42042/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T21:16:31+03:00</news:publication_date>
      <news:title>CVE-2026-42042 — Axios is a promise based HTTP client for the browser and</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-183, cwe-201</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-42041/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T21:16:31+03:00</news:publication_date>
      <news:title>CVE-2026-42041 — Axios is a promise based HTTP client for the browser and</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-287, cwe-1321</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-42038/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T21:16:30+03:00</news:publication_date>
      <news:title>CVE-2026-42038 — Axios is a promise based HTTP client for the browser and</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-918</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-42037/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T21:16:30+03:00</news:publication_date>
      <news:title>CVE-2026-42037 — Axios is a promise based HTTP client for the browser and</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-93</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-42036/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T21:16:30+03:00</news:publication_date>
      <news:title>CVE-2026-42036 — Axios is a promise based HTTP client for the browser and</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-770</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-42035/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T21:16:30+03:00</news:publication_date>
      <news:title>Axios CVE-2026-42035: Prototype Pollution Leads to Header Injection</news:title><news:keywords>vulnerability, cve, high-severity, cwe-113, cwe-1321</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-42034/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T21:16:30+03:00</news:publication_date>
      <news:title>CVE-2026-42034 — Axios is a promise based HTTP client for the browser and</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-770</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-42033/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T21:16:29+03:00</news:publication_date>
      <news:title>CVE-2026-42033: Axios Prototype Pollution Allows Response Tampering, HTTP Hijacking</news:title><news:keywords>vulnerability, cve, high-severity, cwe-1321</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41322/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T21:16:28+03:00</news:publication_date>
      <news:title>CVE-2026-41322 — @astrojs/node allows Astro to deploy your SSR site to Node</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-525</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/microsoft-to-roll-out-entra-passkeys-on-windows-in-late-apri-luumc/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T21:13:55+03:00</news:publication_date>
      <news:title>Microsoft Entra Passkeys Roll Out to Windows Devices</news:title><news:keywords>threat-intel, data-breach, malware, microsoft, identity, phishing</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6912/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T20:16:22+03:00</news:publication_date>
      <news:title>AWS Cognito Flaw Grants Deployment Admin Privileges</news:title><news:keywords>vulnerability, cve, high-severity, cwe-915</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6911/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T20:16:22+03:00</news:publication_date>
      <news:title>Critical JWT Bypass in AWS Ops Wheel Grants Admin Access</news:title><news:keywords>vulnerability, cve, critical, high-severity, cwe-347</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41411/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T20:16:22+03:00</news:publication_date>
      <news:title>CVE-2026-41411 — Command Injection</news:title><news:keywords>vulnerability, cve, medium-severity, command-injection, cwe-78</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41079/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T20:16:21+03:00</news:publication_date>
      <news:title>CVE-2026-41079 — Out-of-Bounds $1</news:title><news:keywords>vulnerability, cve, medium-severity, out-of-bounds-1, cwe-125, cwe-200</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41067/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T20:16:21+03:00</news:publication_date>
      <news:title>CVE-2026-41067 — Astro is a web framework. Prior to 6.1.6, the</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-79</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41066/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T20:16:20+03:00</news:publication_date>
      <news:title>lxml XML Parsing Vulnerability Exposes Local Files</news:title><news:keywords>vulnerability, cve, high-severity, cwe-611</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-40897/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T20:16:20+03:00</news:publication_date>
      <news:title>Critical RCE in Math.js Expression Parser (CVE-2026-40897)</news:title><news:keywords>vulnerability, cve, high-severity, cwe-915</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/pentagon-grapples-with-securing-ai-as-it-moves-toward-autono-34zqn/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T20:14:00+03:00</news:publication_date>
      <news:title>Pentagon Grapples with Securing AI in Autonomous Warfare</news:title><news:keywords>threat-intel, data-breach, government</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-39920/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T19:16:36+03:00</news:publication_date>
      <news:title>Critical RCE in BridgeHead FileStore via Default Axis2 Credentials</news:title><news:keywords>vulnerability, cve, critical, high-severity, cwe-1188, cwe-1391</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-42095/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T18:16:48+03:00</news:publication_date>
      <news:title>CVE-2026-42095 — bookserver in KDE Arianna before 26.04.1 allows attackers</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-306</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/norway-s-prime-minister-proposes-ban-on-social-media-access-k0yg1/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T17:41:00+03:00</news:publication_date>
      <news:title>Norway Proposes Social Media Ban for Young Teens</news:title><news:keywords>threat-intel, data-breach, government, tools</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/in-other-news-unauthorized-mythos-access-plankey-cisa-nomi-90z3p/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T17:31:51+03:00</news:publication_date>
      <news:title>Mythos Unauthorized Access, CISA Nom Withdrawal, New Display Security</news:title><news:keywords>threat-intel, vulnerability, data-breach</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nasa-employees-duped-in-chinese-phishing-scheme-targeting-u-j2hj6/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T17:13:00+03:00</news:publication_date>
      <news:title>China Targets NASA with Phishing for Defense Software</news:title><news:keywords>threat-intel, vulnerability, cloud, microsoft, phishing</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/toronto-police-arrest-three-in-canada-s-first-mobile-sms-bla-3lai4/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T16:45:00+03:00</news:publication_date>
      <news:title>Canada&apos;s First SMS Blaster Arrests: A Shift in Phishing Tactics</news:title><news:keywords>threat-intel, data-breach, government, phishing</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-5367/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T16:16:21+03:00</news:publication_date>
      <news:title>OVN Out-of-Bounds Read Exposes Heap Memory via DHCPv6</news:title><news:keywords>vulnerability, cve, high-severity, out-of-bounds-1, cwe-130</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-5265/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T16:16:21+03:00</news:publication_date>
      <news:title>CVE-2026-5265 — When generating an ICMP Destination Unreachable or Packet</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-130</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-21515/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T16:16:03+03:00</news:publication_date>
      <news:title>Critical Azure IoT Central Flaw Exposes Sensitive Data, Allows Privilege Escalation</news:title><news:keywords>vulnerability, cve, critical, high-severity, cwe-200</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/north-korea-s-lazarus-targets-macos-users-via-clickfix-jr0ng/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T16:00:00+03:00</news:publication_date>
      <news:title>Lazarus Targets macOS via ClickFix: North Korea&apos;s New Attack Vector</news:title><news:keywords>threat-intel, tools</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1707304340-2291/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T15:57:25+03:00</news:publication_date>
      <news:title>Ransomware Costs Spike: VPNs and SonicWall Exploited</news:title><news:keywords>israel, malware, ransomware, cloud</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/cisa-kev-CVE-2024-7399/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T15:00:00+03:00</news:publication_date>
      <news:title>CVE-2024-7399 — Samsung MagicINFO 9 Server: Samsung MagicINFO 9 Server Path Traversal Vulnerability</news:title><news:keywords>vulnerability, cve, cisa-kev, actively-exploited</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/cisa-kev-CVE-2024-57728/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T15:00:00+03:00</news:publication_date>
      <news:title>CVE-2024-57728 — SimpleHelp  SimpleHelp: SimpleHelp Path Traversal Vulnerability</news:title><news:keywords>vulnerability, cve, cisa-kev, actively-exploited</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/cisa-kev-CVE-2024-57726/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T15:00:00+03:00</news:publication_date>
      <news:title>CVE-2024-57726 — SimpleHelp  SimpleHelp: SimpleHelp Missing Authorization Vulnerability</news:title><news:keywords>vulnerability, cve, cisa-kev, actively-exploited</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/bridging-the-ai-agent-authority-gap-continuous-observabilit-tw3co/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T14:49:00+03:00</news:publication_date>
      <news:title>AI Agents: The Delegated Risk Gap Defenders Must Close</news:title><news:keywords>threat-intel, vulnerability, ai-security</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/26-fakewallet-apps-found-on-apple-app-store-targeting-crypto-vskn6/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T14:48:00+03:00</news:publication_date>
      <news:title>Fake Crypto Wallets Flood App Store, Targeting User Seed Phrases</news:title><news:keywords>threat-intel, vulnerability, malware</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/vulnerabilities-patched-in-crowdstrike-tenable-products-qo8nt/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T12:49:27+03:00</news:publication_date>
      <news:title>Critical Flaws Hit CrowdStrike, Tenable Products; Patches Released</news:title><news:keywords>threat-intel, vulnerability</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/tropic-trooper-uses-trojanized-sumatrapdf-and-github-to-depl-xft8b/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T12:29:00+03:00</news:publication_date>
      <news:title>Tropic Trooper Exploits SumatraPDF and VS Code Tunnels for Espionage</news:title><news:keywords>threat-intel, vulnerability, malware, microsoft, tools</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-21728/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T12:16:03+03:00</news:publication_date>
      <news:title>Tempo Vulnerability: High-Severity Flaw Risks Service Availability</news:title><news:keywords>vulnerability, cve, high-severity</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-4078/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T11:16:30+03:00</news:publication_date>
      <news:title>CVE-2026-4078 — Cross-Site Scripting (XSS)</news:title><news:keywords>vulnerability, cve, medium-severity, cross-site-scripting-xss, cwe-79</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-3569/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T11:16:30+03:00</news:publication_date>
      <news:title>CVE-2026-3569 — The Liaison Site Prober plugin for WordPress is vulnerable</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-862</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-3565/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T11:16:30+03:00</news:publication_date>
      <news:title>CVE-2026-3565 — The Taqnix plugin for WordPress is vulnerable to Cross-Site</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-352</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2025-11762/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T11:16:29+03:00</news:publication_date>
      <news:title>CVE-2025-11762 — The HubSpot All-In-One Marketing - Forms, Popups, Live Chat</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-862</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-1952/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T10:16:09+03:00</news:publication_date>
      <news:title>Delta Electronics AS320T Plagued by Critical DoS Vulnerability</news:title><news:keywords>vulnerability, cve, critical, high-severity, denial-of-service, cwe-912</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-1951/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T10:16:09+03:00</news:publication_date>
      <news:title>Critical Buffer Overflow in Delta Electronics AS320T PLC</news:title><news:keywords>vulnerability, cve, critical, high-severity, cwe-121</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-1950/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T10:16:08+03:00</news:publication_date>
      <news:title>Critical Buffer Overflow Hits Delta Electronics AS320T</news:title><news:keywords>vulnerability, cve, critical, high-severity, cwe-121</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6810/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T09:16:08+03:00</news:publication_date>
      <news:title>CVE-2026-6810 — The Booking Calendar Contact Form plugin for WordPress is</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-639</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-5428/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T09:16:08+03:00</news:publication_date>
      <news:title>CVE-2026-5428 — Cross-Site Scripting (XSS)</news:title><news:keywords>vulnerability, cve, medium-severity, cross-site-scripting-xss, cwe-79</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-5364/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T09:16:08+03:00</news:publication_date>
      <news:title>WordPress Plugin Flaw Exposes Sites to RCE</news:title><news:keywords>vulnerability, cve, high-severity, remote-code-execution, cwe-434</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-5347/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T09:16:04+03:00</news:publication_date>
      <news:title>CVE-2026-5347 — The HM Books Gallery plugin for WordPress is vulnerable to</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-862</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-1949/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T09:16:03+03:00</news:publication_date>
      <news:title>Critical RCE in Delta Electronics AS320T Industrial Controllers</news:title><news:keywords>vulnerability, cve, critical, high-severity, cwe-131</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1542954397-4536/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T08:03:39+03:00</news:publication_date>
      <news:title>AI-Generated &apos;Books&apos; Exploit Amazon&apos;s Kindle Unlimited, Generate Millions</news:title><news:keywords></news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6947/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T07:16:23+03:00</news:publication_date>
      <news:title>D-Link DWM-222W Wi-Fi Adapter Vulnerable to Brute-Force Bypass</news:title><news:keywords>vulnerability, cve, high-severity, cwe-307</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6393/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T07:16:22+03:00</news:publication_date>
      <news:title>CVE-2026-6393 — The BetterDocs plugin for WordPress is vulnerable to</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-862</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-5488/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T07:16:22+03:00</news:publication_date>
      <news:title>CVE-2026-5488 — The ExactMetrics – Google Analytics Dashboard for WordPress</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-862</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41485/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T07:16:21+03:00</news:publication_date>
      <news:title>Kyverno Policy Engine Flaw: Cluster Crash and Admission Controller Bypass</news:title><news:keywords>vulnerability, cve, high-severity, cwe-617</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41324/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T07:16:20+03:00</news:publication_date>
      <news:title>Node.js FTP Clients Exposed to DoS via Malicious Listings</news:title><news:keywords>vulnerability, cve, high-severity, denial-of-service, cwe-400, cwe-770</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41323/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T07:16:20+03:00</news:publication_date>
      <news:title>Kyverno API Call Vulnerability Exposes Kubernetes Clusters</news:title><news:keywords>vulnerability, cve, high-severity, cwe-200, cwe-918</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41319/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T07:16:20+03:00</news:publication_date>
      <news:title>CVE-2026-41319 — Versions Prior To Vulnerability</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-74</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41318/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T07:16:20+03:00</news:publication_date>
      <news:title>CVE-2026-41318 — Cross-Site Scripting (XSS)</news:title><news:keywords>vulnerability, cve, medium-severity, cross-site-scripting-xss, cwe-79, cwe-116, cwe-1336</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41068/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T07:16:19+03:00</news:publication_date>
      <news:title>Kyverno Privilege Escalation: RBAC Bypass in Multi-Tenant Clusters</news:title><news:keywords>vulnerability, cve, high-severity, privilege-escalation, cwe-863</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-2028/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T07:16:09+03:00</news:publication_date>
      <news:title>CVE-2026-2028 — Arbitrary File Access</news:title><news:keywords>vulnerability, cve, medium-severity, arbitrary-file-access, cwe-639</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41316/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T06:16:11+03:00</news:publication_date>
      <news:title>Ruby ERB Deserialization Flaw Allows Code Execution</news:title><news:keywords>vulnerability, cve, high-severity, code-execution, cwe-693</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41309/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T06:16:11+03:00</news:publication_date>
      <news:title>OSSN Resource Exhaustion: DoS Risk from Malicious Image Uploads</news:title><news:keywords>vulnerability, cve, high-severity, denial-of-service, cwe-400, cwe-770</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41305/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T06:16:11+03:00</news:publication_date>
      <news:title>CVE-2026-41305 — Cross-Site Scripting (XSS)</news:title><news:keywords>vulnerability, cve, medium-severity, cross-site-scripting-xss, cwe-79</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-40254/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T06:16:11+03:00</news:publication_date>
      <news:title>CVE-2026-40254 — Path Traversal</news:title><news:keywords>vulnerability, cve, medium-severity, path-traversal, cwe-193</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-33318/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T06:16:11+03:00</news:publication_date>
      <news:title>Actual Finance Tool: Local Admin Escalation via OIDC Migration Flaw</news:title><news:keywords>vulnerability, cve, high-severity, privilege-escalation, cwe-284, cwe-862</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-33317/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T06:16:11+03:00</news:publication_date>
      <news:title>OP-TEE Vulnerability Exposes TrustZone to OOB Reads, Crashes</news:title><news:keywords>vulnerability, cve, high-severity, out-of-bounds-1, cwe-125, cwe-787</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-32952/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T06:16:07+03:00</news:publication_date>
      <news:title>CVE-2026-32952 — go-ntlmssp is a Go package that provides NTLM/Negotiate</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-190</news:keywords>
    </news:news>
  </url></urlset>
