<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9"
        xmlns:news="http://www.google.com/schemas/sitemap-news/0.9"><url>
    <loc>https://shimiscyberworld.com/posts/trump-s-cyber-ambassador-nominee-advances-to-full-senate-vot-27elz/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-30T19:34:00+03:00</news:publication_date>
      <news:title>Trump&apos;s Cyber Ambassador Nominee Advances to Full Senate Vote</news:title><news:keywords>threat-intel, data-breach, government</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1542954397-4553/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-30T19:32:51+03:00</news:publication_date>
      <news:title>AI Agent Wipes Production Database and Backups for PocketOS</news:title><news:keywords>identity, ai-security</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/fbi-links-cybercriminals-to-sharp-surge-in-cargo-theft-attac-6itos/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-30T19:32:18+03:00</news:publication_date>
      <news:title>FBI Warns of Cyber-Enabled Cargo Theft Surge, $725M Losses Projected</news:title><news:keywords>threat-intel, data-breach, malware</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/france-investigates-15-year-old-over-alleged-hack-of-nationa-qjps2/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-30T19:28:00+03:00</news:publication_date>
      <news:title>France Investigates Teen Over National ID Agency Data Breach</news:title><news:keywords>threat-intel, data-breach, government, identity</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-5174/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-30T19:16:44+03:00</news:publication_date>
      <news:title>MOVEit Automation Privilege Escalation (CVE-2026-5174)</news:title><news:keywords>vulnerability, cve, high-severity, privilege-escalation, cwe-20</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-4670/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-30T19:16:44+03:00</news:publication_date>
      <news:title>MOVEit Automation Critical Authentication Bypass (CVE-2026-4670)</news:title><news:keywords>vulnerability, cve, critical, high-severity, authentication-bypass, cwe-305</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1542954397-4552/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-30T18:20:19+03:00</news:publication_date>
      <news:title>AI Bots Drive 12X Surge in Daily Attacks, Over Half of Web Traffic is Automated</news:title><news:keywords>threat-intel, the-independent</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7500/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-30T18:16:23+03:00</news:publication_date>
      <news:title>CVE-2026-7500 — When Keycloak is started with</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-425</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7246/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-30T17:16:36+03:00</news:publication_date>
      <news:title>Pallets Click CVE-2026-7246: Command Injection from Unprivileged Accounts</news:title><news:keywords>vulnerability, cve, high-severity, command-injection, cwe-77</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7163/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-30T17:16:36+03:00</news:publication_date>
      <news:title>CVE-2026-7163 — The Assisted-Service REST API, An Optional Assisted Installe Vulnerability</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-312</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-2892/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-30T17:16:29+03:00</news:publication_date>
      <news:title>Otter Blocks WordPress Plugin Vulnerable to Purchase Bypass (CVE-2026-2892)</news:title><news:keywords>vulnerability, cve, high-severity, cwe-285</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/threatsday-bulletin-sms-blaster-busts-openemr-flaws-600k-84jfh/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-30T16:55:00+03:00</news:publication_date>
      <news:title>Fake Cell Towers and Sneaky Installers: New Threats Emerge</news:title><news:keywords>threat-intel, vulnerability, cloud, tools, the-hacker-news</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/moldova-s-health-insurance-agency-reports-possible-data-leak-d0t29/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-30T16:37:00+03:00</news:publication_date>
      <news:title>Moldova Health Insurance Agency Reports Possible Data Leak After Cyberattack</news:title><news:keywords>threat-intel, data-breach, government</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7402/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-30T16:16:06+03:00</news:publication_date>
      <news:title>MeWare PDKS Flooding Vulnerability: CVE-2026-7402 Impacts Time &amp; Attendance Systems</news:title><news:keywords>vulnerability, cve, high-severity, cwe-799</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7399/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-30T16:16:06+03:00</news:publication_date>
      <news:title>MeWare PDKS Authorization Bypass (CVE-2026-7399) Exposes High-Risk Privilege Abuse</news:title><news:keywords>vulnerability, cve, high-severity, cwe-639</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7382/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-30T16:16:06+03:00</news:publication_date>
      <news:title>CVE-2026-7382 — MeWare Software Development Inc. PDKS Vulnerability</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-200, cwe-359</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/new-python-backdoor-uses-tunneling-service-to-steal-browser-ei1dl/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-30T15:36:00+03:00</news:publication_date>
      <news:title>DEEP#DOOR Python Backdoor Disables Security Controls for Credential Theft</news:title><news:keywords>threat-intel, vulnerability, malware, cloud, microsoft, identity, tools</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41882/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-30T15:16:24+03:00</news:publication_date>
      <news:title>JetBrains IntelliJ IDEA Vulnerability Allows Arbitrary File Reading</news:title><news:keywords>vulnerability, cve, high-severity, cwe-59</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/enocean-smartserver-flaws-expose-buildings-to-remote-hacking-q04hq/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-30T14:57:31+03:00</news:publication_date>
      <news:title>EnOcean SmartServer Vulnerabilities Enable Building System Hacking</news:title><news:keywords>threat-intel, vulnerability, cloud</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/etherrat-distribution-spoofing-administrative-tools-via-gith-mmur8/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-30T14:30:00+03:00</news:publication_date>
      <news:title>EtherRAT Campaign Spoofs Admin Tools via GitHub Facades</news:title><news:keywords>threat-intel, vulnerability, tools</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/critical-cpanel-whm-vulnerability-exploited-as-zero-day-fo-s3kuu/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-30T14:10:30+03:00</news:publication_date>
      <news:title>cPanel &amp; WHM Zero-Day Exploited for Months, Granting Admin Access</news:title><news:keywords>threat-intel, vulnerability, identity</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6498/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-30T13:16:02+03:00</news:publication_date>
      <news:title>CVE-2026-6498 — The Five Star Restaurant Reservations plugin for WordPress</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-345</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-42800/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-30T13:16:02+03:00</news:publication_date>
      <news:title>CVE-2026-42800: High-Severity Null Pointer Dereference in ASR Lapwing_Linux</news:title><news:keywords>vulnerability, cve, high-severity, null-pointer-dereference, cwe-476</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/new-linux-copy-fail-vulnerability-enables-root-access-on-m-avzxo/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-30T12:24:00+03:00</news:publication_date>
      <news:title>Linux &apos;Copy Fail&apos; Vulnerability Grants Root Access</news:title><news:keywords>threat-intel, vulnerability</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-42799/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-30T12:16:03+03:00</news:publication_date>
      <news:title>CVE-2026-42799: ASR Kestrel Out-of-Bounds Read Flaw Exposes Systems</news:title><news:keywords>vulnerability, cve, high-severity, out-of-bounds-1, cwe-125</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-22070/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-30T12:16:02+03:00</news:publication_date>
      <news:title>ColorOS Assistant CVE-2026-22070: Unauthenticated Path Traversal Risk</news:title><news:keywords>vulnerability, cve, high-severity, path-traversal, cwe-23</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/sandhills-medical-says-ransomware-breach-affects-170-000-1xudy/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-30T11:35:59+03:00</news:publication_date>
      <news:title>Sandhills Medical Discloses Inc Ransomware Breach Affecting 170,000 Patients</news:title><news:keywords>threat-intel, vulnerability, malware, ransomware, data-breach</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6521/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-30T10:16:39+03:00</news:publication_date>
      <news:title>CVE-2026-6521 — Denial of Service</news:title><news:keywords>vulnerability, cve, medium-severity, denial-of-service, cwe-835</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6520/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-30T10:16:39+03:00</news:publication_date>
      <news:title>CVE-2026-6520 — Denial of Service</news:title><news:keywords>vulnerability, cve, medium-severity, denial-of-service, cwe-835</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6519/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-30T10:16:39+03:00</news:publication_date>
      <news:title>CVE-2026-6519 — Denial of Service</news:title><news:keywords>vulnerability, cve, medium-severity, denial-of-service, cwe-835</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-5657/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-30T10:16:38+03:00</news:publication_date>
      <news:title>CVE-2026-5657 — Denial of Service</news:title><news:keywords>vulnerability, cve, medium-severity, denial-of-service, cwe-415</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-5655/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-30T10:16:38+03:00</news:publication_date>
      <news:title>CVE-2026-5655 — Denial of Service</news:title><news:keywords>vulnerability, cve, medium-severity, denial-of-service, cwe-416</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-5654/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-30T10:16:38+03:00</news:publication_date>
      <news:title>CVE-2026-5654 — Denial of Service</news:title><news:keywords>vulnerability, cve, medium-severity, denial-of-service, cwe-121</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-5653/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-30T10:16:38+03:00</news:publication_date>
      <news:title>CVE-2026-5653 — Denial of Service</news:title><news:keywords>vulnerability, cve, medium-severity, denial-of-service, cwe-122</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-5409/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-30T10:16:38+03:00</news:publication_date>
      <news:title>CVE-2026-5409 — Denial of Service</news:title><news:keywords>vulnerability, cve, medium-severity, denial-of-service, cwe-674</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-5408/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-30T10:16:38+03:00</news:publication_date>
      <news:title>CVE-2026-5408 — Denial of Service</news:title><news:keywords>vulnerability, cve, medium-severity, denial-of-service, cwe-674</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-5407/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-30T10:16:38+03:00</news:publication_date>
      <news:title>CVE-2026-5407 — Denial of Service</news:title><news:keywords>vulnerability, cve, medium-severity, denial-of-service, cwe-835</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-5406/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-30T10:16:37+03:00</news:publication_date>
      <news:title>CVE-2026-5406 — Denial of Service</news:title><news:keywords>vulnerability, cve, medium-severity, denial-of-service, cwe-674</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-5402/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-30T10:16:37+03:00</news:publication_date>
      <news:title>Wireshark TLS Dissector Heap Overflow (CVE-2026-5402) Enables DoS, RCE</news:title><news:keywords>vulnerability, cve, high-severity, code-execution, cwe-122</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-5401/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-30T10:16:37+03:00</news:publication_date>
      <news:title>CVE-2026-5401 — Denial of Service</news:title><news:keywords>vulnerability, cve, medium-severity, denial-of-service, cwe-674</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-5299/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-30T10:16:37+03:00</news:publication_date>
      <news:title>CVE-2026-5299 — Denial of Service</news:title><news:keywords>vulnerability, cve, medium-severity, denial-of-service, cwe-674</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41226/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-30T10:16:37+03:00</news:publication_date>
      <news:title>CVE-2026-41226 — Open Redirect</news:title><news:keywords>vulnerability, cve, medium-severity, open-redirect, cwe-601</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/google-fixes-cvss-10-gemini-cli-ci-rce-and-cursor-flaws-enab-bv4bq/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-30T10:07:00+03:00</news:publication_date>
      <news:title>Google Gemini CLI RCE: CVSS 10 Flaw Exposes CI/CD to Attack</news:title><news:keywords>threat-intel, vulnerability, cloud, tools</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7379/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-30T09:16:17+03:00</news:publication_date>
      <news:title>CVE-2026-7379 — Denial of Service</news:title><news:keywords>vulnerability, cve, medium-severity, denial-of-service, cwe-401</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7378/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-30T09:16:17+03:00</news:publication_date>
      <news:title>CVE-2026-7378 — Denial of Service</news:title><news:keywords>vulnerability, cve, medium-severity, denial-of-service, cwe-122</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7376/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-30T09:16:17+03:00</news:publication_date>
      <news:title>CVE-2026-7376 — Denial of Service</news:title><news:keywords>vulnerability, cve, medium-severity, denial-of-service, cwe-476</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7375/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-30T09:16:16+03:00</news:publication_date>
      <news:title>CVE-2026-7375 — Denial of Service</news:title><news:keywords>vulnerability, cve, medium-severity, denial-of-service, cwe-835</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6868/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-30T09:16:16+03:00</news:publication_date>
      <news:title>CVE-2026-6868 — Denial of Service</news:title><news:keywords>vulnerability, cve, medium-severity, denial-of-service, cwe-121</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2025-13030/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-30T09:16:14+03:00</news:publication_date>
      <news:title>CVE-2025-13030: django-mdeditor Vulnerable to Code Execution via Image Upload</news:title><news:keywords>vulnerability, cve, high-severity, code-execution, cwe-306</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1427288221-8854/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-30T07:18:04+03:00</news:publication_date>
      <news:title>Iranian Group Claims 30TB Breach of Israeli Company IMCO Industries</news:title><news:keywords>israel</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7470/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-30T06:16:01+03:00</news:publication_date>
      <news:title>CVE-2026-7470: Tenda 4G300 Router Vulnerable to Remote Stack Overflow</news:title><news:keywords>vulnerability, cve, high-severity, buffer-overflow, cwe-119, cwe-121</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7469/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-30T05:16:06+03:00</news:publication_date>
      <news:title>CVE-2026-7469 — Tenda 4G300 US_4G300V1.0Mt_V1.01.42_CN_TDC01 Command Injection</news:title><news:keywords>vulnerability, cve, medium-severity, command-injection, cwe-74, cwe-77</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7468/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-30T04:16:03+03:00</news:publication_date>
      <news:title>CVE-2026-7468: Improper Access Control Flaw in 1024-lab smart-admin</news:title><news:keywords>vulnerability, cve, high-severity, improper-access-control, cwe-266, cwe-284</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7447/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-30T04:16:02+03:00</news:publication_date>
      <news:title>CVE-2026-7447 — SourceCodester Pet Grooming Management Software SQL Injection</news:title><news:keywords>vulnerability, cve, medium-severity, sql-injection, cwe-74, cwe-89</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7446/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-30T03:16:23+03:00</news:publication_date>
      <news:title>CVE-2026-7446: VetCoders mcp-server-semgrep OS Command Injection</news:title><news:keywords>vulnerability, cve, high-severity, command-injection, cwe-77, cwe-78</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7445/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-30T03:16:23+03:00</news:publication_date>
      <news:title>CVE-2026-7445 — ZachHandley ZMCPTools Path Traversal</news:title><news:keywords>vulnerability, cve, medium-severity, path-traversal, cwe-22</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7443/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-30T02:16:20+03:00</news:publication_date>
      <news:title>CVE-2026-7443: BurtTheCoder mcp-dnstwist OS Command Injection</news:title><news:keywords>vulnerability, cve, high-severity, command-injection, cwe-77, cwe-78</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7420/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-30T02:16:20+03:00</news:publication_date>
      <news:title>CVE-2026-7420: UTT HiPER 1250GW Buffer Overflow Exploitable Remotely</news:title><news:keywords>vulnerability, cve, high-severity, buffer-overflow, cwe-119, cwe-120</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7419/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-30T02:16:20+03:00</news:publication_date>
      <news:title>UTT HiPER 1250GW CVE-2026-7419: Remote Buffer Overflow Exploitable</news:title><news:keywords>vulnerability, cve, high-severity, buffer-overflow, cwe-119, cwe-120</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/official-sap-npm-packages-compromised-to-steal-credentials-uiepq/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-30T01:43:44+03:00</news:publication_date>
      <news:title>SAP npm Packages Compromised in Supply-Chain Attack</news:title><news:keywords>threat-intel, data-breach, malware, identity</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/house-approves-spy-program-on-second-attempt-senate-fate-mu-3dg2q/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-30T01:41:00+03:00</news:publication_date>
      <news:title>House Renews Section 702 FISA, Senate Fate Uncertain</news:title><news:keywords>threat-intel, data-breach, government</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7418/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-30T01:16:22+03:00</news:publication_date>
      <news:title>UTT HiPER 1250GW: High-Severity Buffer Overflow (CVE-2026-7418)</news:title><news:keywords>vulnerability, cve, high-severity, buffer-overflow, cwe-119, cwe-120</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7417/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-30T01:16:22+03:00</news:publication_date>
      <news:title>Algovate xhs-mcp SSRF Vulnerability (CVE-2026-7417) Publicly Disclosed</news:title><news:keywords>vulnerability, cve, high-severity, server-side-request-forgery, cwe-918</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7416/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-30T01:16:22+03:00</news:publication_date>
      <news:title>PolarVista xcode-mcp-server Suffers High-Severity OS Command Injection</news:title><news:keywords>vulnerability, cve, high-severity, command-injection, cwe-77, cwe-78</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7410/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-30T01:16:22+03:00</news:publication_date>
      <news:title>CVE-2026-7410 — SourceCodester Pizzafy Ecommerce System SQL Injection</news:title><news:keywords>vulnerability, cve, medium-severity, sql-injection, cwe-74, cwe-89</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7409/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-30T01:16:21+03:00</news:publication_date>
      <news:title>CVE-2026-7409 — SourceCodester Pizzafy Ecommerce System SQL Injection</news:title><news:keywords>vulnerability, cve, medium-severity, sql-injection, cwe-74, cwe-89</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7408/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-30T00:16:22+03:00</news:publication_date>
      <news:title>CVE-2026-7408 — SourceCodester Pizzafy Ecommerce System SQL Injection</news:title><news:keywords>vulnerability, cve, medium-severity, sql-injection, cwe-74, cwe-89</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7407/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-30T00:16:22+03:00</news:publication_date>
      <news:title>CVE-2026-7407 — SourceCodester Pizzafy Ecommerce System SQL Injection</news:title><news:keywords>vulnerability, cve, medium-severity, sql-injection, cwe-74, cwe-89</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7404/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-30T00:16:22+03:00</news:publication_date>
      <news:title>CVE-2026-7404: mcpo-simple-server Vulnerability Exposes Data via Path Traversal</news:title><news:keywords>vulnerability, cve, high-severity, path-traversal, cwe-22, cwe-23</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7403/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-30T00:16:22+03:00</news:publication_date>
      <news:title>CVE-2026-7403 — Geldata Gel-Mcp Path Traversal</news:title><news:keywords>vulnerability, cve, medium-severity, path-traversal, cwe-22</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-1858/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-30T00:16:20+03:00</news:publication_date>
      <news:title>CVE-2026-1858 — wget2 accepts a server certificate with incorrect Key Usage</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-20</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/researchers-built-a-chatbot-that-only-knows-the-world-before-cchcy/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-29T23:58:30+03:00</news:publication_date>
      <news:title>Researchers Build LLM Limited to Pre-1931 Knowledge for Bias Study</news:title><news:keywords>malware, threat-intel, ransomware, data-breach, cloud, identity, ai-security, tools</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/us-china-partner-on-scam-center-takedown-in-dubai-17mq8/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-29T23:51:00+03:00</news:publication_date>
      <news:title>US, China Partner on Dubai Scam Center Takedown</news:title><news:keywords>threat-intel, data-breach, government</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/hackers-exploit-rce-flaws-in-qinglong-task-scheduler-for-cry-1kr1n/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-29T23:50:35+03:00</news:publication_date>
      <news:title>Qinglong Task Scheduler Exploited for Cryptomining via RCE Flaws</news:title><news:keywords>threat-intel, data-breach, malware, vulnerability, cloud, identity, tools, bleepingcomputer</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7426/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-29T23:16:32+03:00</news:publication_date>
      <news:title>CVE-2026-7426: FreeRTOS-Plus-TCP IPv6 RA Heap Overflow</news:title><news:keywords>vulnerability, cve, high-severity, buffer-overflow, cwe-787</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-34965/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-29T23:16:29+03:00</news:publication_date>
      <news:title>CVE-2026-34965: Cockpit CMS RCE via PHP Code Injection</news:title><news:keywords>vulnerability, cve, high-severity, remote-code-execution, cwe-94</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2018-25318/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-29T23:16:27+03:00</news:publication_date>
      <news:title>CVE-2018-25318: Tenda Router Vulnerability Allows DNS Hijacking</news:title><news:keywords>vulnerability, cve, critical, high-severity, cwe-290</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2018-25317/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-29T23:16:27+03:00</news:publication_date>
      <news:title>Tenda Routers: CVE-2018-25317 Allows Unauthenticated DNS Hijacking</news:title><news:keywords>vulnerability, cve, critical, high-severity, cwe-290</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2018-25316/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-29T23:16:27+03:00</news:publication_date>
      <news:title>CVE-2018-25316: Tenda Router Flaw Exposes DNS Hijacking Risk</news:title><news:keywords>vulnerability, cve, critical, high-severity, cwe-290</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2018-25315/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-29T23:16:27+03:00</news:publication_date>
      <news:title>CVE-2018-25315: Alloksoft Video Joiner Buffer Overflow Allows Code Execution</news:title><news:keywords>vulnerability, cve, high-severity, code-execution, cwe-120</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2018-25314/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-29T23:16:27+03:00</news:publication_date>
      <news:title>CVE-2018-25314: Alloksoft WMV Converter Buffer Overflow Allows Local Code Execution</news:title><news:keywords>vulnerability, cve, high-severity, buffer-overflow, cwe-120</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2018-25308/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-29T23:16:26+03:00</news:publication_date>
      <news:title>BuddyPress RCE: Authenticated Users Can Delete Arbitrary Files</news:title><news:keywords>vulnerability, cve, high-severity, remote-code-execution, cwe-22</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2018-25307/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-29T23:16:26+03:00</news:publication_date>
      <news:title>SysGauge Pro 4.6.12 Vulnerability Allows Local Code Execution</news:title><news:keywords>vulnerability, cve, high-severity, buffer-overflow, cwe-120</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2018-25304/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-29T23:16:25+03:00</news:publication_date>
      <news:title>Free Download Manager CVE-2018-25304: Local Buffer Overflow Allows Code Execution</news:title><news:keywords>vulnerability, cve, high-severity, buffer-overflow, cwe-120</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2018-25303/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-29T23:16:25+03:00</news:publication_date>
      <news:title>CVE-2018-25303: Allok Video to DVD Burner Stack Overflow</news:title><news:keywords>vulnerability, cve, high-severity, code-execution, cwe-121</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2018-25302/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-29T23:16:25+03:00</news:publication_date>
      <news:title>CVE-2018-25302: Allok AVI to DVD Converter Buffer Overflow</news:title><news:keywords>vulnerability, cve, high-severity, code-execution, cwe-120</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2018-25301/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-29T23:16:25+03:00</news:publication_date>
      <news:title>CVE-2018-25301: Easy MPEG to DVD Burner Local Buffer Overflow</news:title><news:keywords>vulnerability, cve, high-severity, buffer-overflow, cwe-120</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2018-25300/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-29T23:16:25+03:00</news:publication_date>
      <news:title>CVE-2018-25300: XATABoost CMS SQL Injection Allows Unauthenticated Data Extraction</news:title><news:keywords>vulnerability, cve, high-severity, sql-injection, cwe-89</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2018-25299/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-29T23:16:25+03:00</news:publication_date>
      <news:title>CVE-2018-25299: Prime95 Local Buffer Overflow Allows Arbitrary Code Execution</news:title><news:keywords>vulnerability, cve, high-severity, buffer-overflow, cwe-120</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/reverse-engineering-with-ai-unearths-high-severity-github-bu-htoqy/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-29T23:08:17+03:00</news:publication_date>
      <news:title>AI Reverse Engineering Unearths High-Severity GitHub Bug</news:title><news:keywords>threat-intel, tools, vulnerability</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/daily-digest/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-29T23:00:00+03:00</news:publication_date>
      <news:title>Daily Security Digest — 2026-04-29</news:title><news:keywords>daily-digest, vulnerability, cve, high-severity, cwe-862, improper-access-control, cwe-266, cwe-269, cwe-284, cwe-59</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/ai-finds-38-security-flaws-in-electronic-health-record-platf-g54ev/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-29T22:32:42+03:00</news:publication_date>
      <news:title>AI Spots 38 Critical Flaws in OpenEMR Healthcare Platform</news:title><news:keywords>threat-intel, tools, cloud</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7466/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-29T22:16:27+03:00</news:publication_date>
      <news:title>AgentFlow RCE Vulnerability (CVE-2026-7466) Allows Local Code Execution</news:title><news:keywords>vulnerability, cve, high-severity, code-execution, cwe-94</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7439/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-29T22:16:26+03:00</news:publication_date>
      <news:title>CVE-2026-7439 — AgentFlow&apos;s local web API accepts non-JSON content types on</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-346</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7424/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-29T22:16:26+03:00</news:publication_date>
      <news:title>CVE-2026-7424: FreeRTOS-Plus-TCP DHCPv6 Vulnerability Leads to DoS</news:title><news:keywords>vulnerability, cve, high-severity, denial-of-service, cwe-191</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7423/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-29T22:16:26+03:00</news:publication_date>
      <news:title>CVE-2026-7423 — Denial of Service</news:title><news:keywords>vulnerability, cve, medium-severity, denial-of-service, cwe-191</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7422/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-29T22:16:26+03:00</news:publication_date>
      <news:title>CVE-2026-7422 — Insufficient packet validation in FreeRTOS-Plus-TCP before</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-290</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7398/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-29T22:16:26+03:00</news:publication_date>
      <news:title>CVE-2026-7398: Path Traversal in BioinfoMCP Upload Endpoint</news:title><news:keywords>vulnerability, cve, high-severity, path-traversal, cwe-22</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7397/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-29T22:16:26+03:00</news:publication_date>
      <news:title>CVE-2026-7397 — NousResearch Hermes-Agent Vulnerability</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-59, cwe-61</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41499/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-29T22:16:23+03:00</news:publication_date>
      <news:title>CVE-2026-41499 — Out-of-Bounds $1</news:title><news:keywords>vulnerability, cve, medium-severity, out-of-bounds-1, cwe-124, cwe-191</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-30893/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-29T22:16:23+03:00</news:publication_date>
      <news:title>Wazuh CVE-2026-30893: Critical Path Traversal to RCE</news:title><news:keywords>vulnerability, cve, critical, high-severity, code-execution, cwe-22, cwe-73</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-28221/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-29T22:16:23+03:00</news:publication_date>
      <news:title>CVE-2026-28221 — Buffer Overflow</news:title><news:keywords>vulnerability, cve, medium-severity, buffer-overflow, cwe-121, cwe-400</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-27105/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-29T22:16:22+03:00</news:publication_date>
      <news:title>CVE-2026-27105 — Arbitrary File Access</news:title><news:keywords>vulnerability, cve, medium-severity, arbitrary-file-access, cwe-59</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-26206/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-29T22:16:22+03:00</news:publication_date>
      <news:title>CVE-2026-26206 — Wazuh is a free and open source platform used for threat</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-307, cwe-362, cwe-367</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7396/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-29T21:16:05+03:00</news:publication_date>
      <news:title>CVE-2026-7396 — NousResearch Hermes-Agent Path Traversal</news:title><news:keywords>vulnerability, cve, medium-severity, path-traversal, cwe-22</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7394/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-29T21:16:05+03:00</news:publication_date>
      <news:title>CVE-2026-7394 — SQL Injection</news:title><news:keywords>vulnerability, cve, medium-severity, sql-injection, cwe-74, cwe-89</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-5712/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-29T21:16:05+03:00</news:publication_date>
      <news:title>IdentityIQ CVE-2026-5712: Authenticated Users Can Edit Roles</news:title><news:keywords>vulnerability, cve, high-severity, cwe-863</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-26204/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-29T21:16:04+03:00</news:publication_date>
      <news:title>CVE-2026-26204 — Denial of Service</news:title><news:keywords>vulnerability, cve, medium-severity, denial-of-service, cwe-124, cwe-191</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7393/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-29T20:16:42+03:00</news:publication_date>
      <news:title>CVE-2026-7393 — SourceCodester Pizzafy Ecommerce System Unrestricted File Upload</news:title><news:keywords>vulnerability, cve, medium-severity, unrestricted-file-upload, cwe-284, cwe-434</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7392/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-29T20:16:41+03:00</news:publication_date>
      <news:title>CVE-2026-7392 — SourceCodester Pharmacy Sales And Inventory System SQL Injection</news:title><news:keywords>vulnerability, cve, medium-severity, sql-injection, cwe-74, cwe-89</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7391/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-29T20:16:41+03:00</news:publication_date>
      <news:title>CVE-2026-7391 — SourceCodester Pharmacy Sales And Inventory System SQL Injection</news:title><news:keywords>vulnerability, cve, medium-severity, sql-injection, cwe-74, cwe-89</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6915/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-29T20:16:41+03:00</news:publication_date>
      <news:title>CVE-2026-6915 — An authorization flaw in the user management command could</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-1284</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6914/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-29T20:16:41+03:00</news:publication_date>
      <news:title>CVE-2026-6914 — Computing the MD5 checksum of a malformed BSON object under</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-191</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-0206/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-29T20:16:40+03:00</news:publication_date>
      <news:title>CVE-2026-0206 — Buffer Overflow</news:title><news:keywords>vulnerability, cve, medium-severity, buffer-overflow, cwe-121</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-0205/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-29T20:16:40+03:00</news:publication_date>
      <news:title>CVE-2026-0205 — SonicOS Path Traversal</news:title><news:keywords>vulnerability, cve, medium-severity, path-traversal, cwe-35</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-0204/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-29T20:16:40+03:00</news:publication_date>
      <news:title>SonicOS Access Control Bypass (CVE-2026-0204) Rated High Severity</news:title><news:keywords>vulnerability, cve, high-severity, cwe-306, cwe-1390</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/sap-npm-packages-compromised-by-mini-shai-hulud-credential-4sc03/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-29T19:26:00+03:00</news:publication_date>
      <news:title>SAP npm Packages Compromised by &quot;Mini Shai-Hulud&quot; Credential Stealing Malware</news:title><news:keywords>threat-intel, vulnerability, malware, cloud, identity</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7389/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-29T19:16:29+03:00</news:publication_date>
      <news:title>CVE-2026-7389: EyouCMS SQL Injection Vulnerability Exposed</news:title><news:keywords>vulnerability, cve, high-severity, sql-injection, cwe-74, cwe-89</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7388/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-29T19:16:29+03:00</news:publication_date>
      <news:title>CVE-2026-7388 — A weakness has been identified in EyouCMS up to 1.7.9.</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-74, cwe-94</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7386/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-29T19:16:29+03:00</news:publication_date>
      <news:title>CVE-2026-7386: fatbobman mail-mcp-bridge Path Traversal Vulnerability</news:title><news:keywords>vulnerability, cve, high-severity, path-traversal, cwe-22</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-6849/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-29T19:16:28+03:00</news:publication_date>
      <news:title>Pardus OS My Computer Vulnerability Allows OS Command Injection</news:title><news:keywords>vulnerability, cve, high-severity, command-injection, cwe-78</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-5166/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-29T19:16:26+03:00</news:publication_date>
      <news:title>CVE-2026-5166: Critical Path Traversal in TUBITAK Pardus Software Center</news:title><news:keywords>vulnerability, cve, critical, high-severity, path-traversal, cwe-22</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-42198/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-29T19:16:25+03:00</news:publication_date>
      <news:title>pgjdbc Client-Side DoS: Malicious Servers Can Exhaust CPU via SCRAM-SHA-256</news:title><news:keywords>vulnerability, cve, high-severity, denial-of-service, cwe-770</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41940/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-29T19:16:25+03:00</news:publication_date>
      <news:title>cPanel &amp; WHM Critical Authentication Bypass (CVE-2026-41940)</news:title><news:keywords>vulnerability, cve, critical, high-severity, authentication-bypass, cwe-306</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/cpanel-whm-emergency-update-fixes-critical-auth-bypass-bug-hr31j/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-29T18:51:44+03:00</news:publication_date>
      <news:title>cPanel, WHM Emergency Patch Fixes Critical Auth Bypass</news:title><news:keywords>threat-intel, data-breach, malware, vulnerability, identity</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/european-commission-accuses-meta-of-breaching-child-safety-r-ozmby/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-29T18:47:00+03:00</news:publication_date>
      <news:title>European Commission Accuses Meta of Child Safety Breaches Under DSA</news:title><news:keywords>threat-intel, data-breach, government</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/vect-2-0-ransomware-acts-as-wiper-thanks-to-design-error-oj9u5/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-29T18:23:53+03:00</news:publication_date>
      <news:title>Vect 2.0 Ransomware Acts as Wiper Due to Design Error</news:title><news:keywords>threat-intel, tools, malware, ransomware</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7384/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-29T18:16:11+03:00</news:publication_date>
      <news:title>CVE-2026-7384 — Ezequiroga Mcp-Bases 357ca19c7a49a9b9cb2ef639b366f03aba8bea3 Path Traversal</news:title><news:keywords>vulnerability, cve, high-severity, path-traversal, cwe-22</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-5161/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-29T18:16:08+03:00</news:publication_date>
      <news:title>CVE-2026-5161: Pardus About Suffers High-Severity Symlink Vulnerability</news:title><news:keywords>vulnerability, cve, high-severity, cwe-59</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-5141/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-29T18:16:07+03:00</news:publication_date>
      <news:title>CVE-2026-5141: Pardus Software Center Vulnerability Allows Privileged Process Hijacking</news:title><news:keywords>vulnerability, cve, high-severity, improper-access-control, cwe-266, cwe-269, cwe-284</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41952/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-29T18:16:06+03:00</news:publication_date>
      <news:title>Acronis DLP and Cyber Protect Agent Vulnerable to Privilege Escalation (CVE-2026-41952)</news:title><news:keywords>vulnerability, cve, high-severity, privilege-escalation, cwe-123</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41220/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-29T18:16:05+03:00</news:publication_date>
      <news:title>Acronis DLP, Cyber Protect Agent Vulnerable to Local Privilege Escalation (CVE-2026-41220)</news:title><news:keywords>vulnerability, cve, high-severity, privilege-escalation, cwe-787</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-25852/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-29T18:16:05+03:00</news:publication_date>
      <news:title>CVE-2026-25852 — Privilege Escalation</news:title><news:keywords>vulnerability, cve, medium-severity, privilege-escalation, cwe-427</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/new-wave-of-dprk-attacks-uses-ai-inserted-npm-malware-fake-ian3i/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-29T17:43:00+03:00</news:publication_date>
      <news:title>DPRK Uses AI-Inserted npm Malware, Targeting Developers</news:title><news:keywords>threat-intel, vulnerability, malware, ai-security</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/swiss-police-arrest-10-suspected-members-of-nigeria-linked-c-2qt9f/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-29T17:15:00+03:00</news:publication_date>
      <news:title>Black Axe: Swiss Police Arrest 10 Suspected Members</news:title><news:keywords>threat-intel, data-breach, government</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/learning-from-the-vercel-breach-shadow-ai-oauth-sprawl-3uywm/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-29T16:05:14+03:00</news:publication_date>
      <news:title>Vercel Breach Highlights OAuth App Risks and Shadow AI Threats</news:title><news:keywords>threat-intel, data-breach, malware, identity</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/lotus-wiper-attack-targeted-venezuelan-energy-firms-utiliti-hhfv0/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-29T16:00:00+03:00</news:publication_date>
      <news:title>Lotus Wiper Targets Venezuelan Energy, Utilities with Sophisticated LotL</news:title><news:keywords>threat-intel, tools, malware</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/github-fixes-rce-flaw-that-gave-access-to-millions-of-privat-xvj23/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-29T15:41:17+03:00</news:publication_date>
      <news:title>GitHub RCE Flaw Could Have Exposed Millions of Private Repositories</news:title><news:keywords>threat-intel, data-breach, malware, vulnerability, tools</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/webinar-how-to-automate-exposure-validation-to-match-the-sp-ynxh4/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-29T15:02:00+03:00</news:publication_date>
      <news:title>AI Automates Attacks: Autonomous Agents Target Active Directory in Minutes</news:title><news:keywords>threat-intel, vulnerability, microsoft, identity, phishing</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/incd-alert_1992/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-29T15:00:00+03:00</news:publication_date>
      <news:title>Unidentified RMM Tool Exploited in Active Attacks Against Israeli Organizations</news:title><news:keywords>incd, israel, advisory, alert</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/what-to-look-for-in-an-exposure-management-platform-and-wha-zhxzs/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-29T14:30:00+03:00</news:publication_date>
      <news:title>Exposure Management Platforms Fall Short: Context is Key, Not Just Counts</news:title><news:keywords>threat-intel, vulnerability</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/cisa-orders-feds-to-patch-windows-flaw-exploited-as-zero-day-47f0x/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-29T13:29:31+03:00</news:publication_date>
      <news:title>CISA Mandates Urgent Patching for Windows Zero-Day Exploited in Attacks</news:title><news:keywords>threat-intel, data-breach, malware, vulnerability, microsoft</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/critical-cpanel-authentication-vulnerability-identified-up-10tps/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-29T12:37:00+03:00</news:publication_date>
      <news:title>Critical cPanel Authentication Flaw Exposes Servers</news:title><news:keywords>threat-intel, vulnerability, identity, tools</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-4019/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-29T12:16:25+03:00</news:publication_date>
      <news:title>CVE-2026-4019 — The Complianz – GDPR/CCPA Cookie Consent plugin for</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-862</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-42412/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-29T12:16:24+03:00</news:publication_date>
      <news:title>CVE-2026-42412 — WeDevs WP User Frontend Vulnerability</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-862</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2025-10503/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-29T12:16:23+03:00</news:publication_date>
      <news:title>CVE-2025-10503 — Cross-Site Scripting (XSS)</news:title><news:keywords>vulnerability, cve, medium-severity, cross-site-scripting-xss, cwe-79</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-42377/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-29T11:16:18+03:00</news:publication_date>
      <news:title>SureForms Pro Vulnerability CVE-2026-42377 Exposes Access Control Flaws</news:title><news:keywords>vulnerability, cve, high-severity, cwe-862</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1427288221-8849/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-29T10:02:16+03:00</news:publication_date>
      <news:title>Cyber News - Erez Dasa: Unattributed Foreign Login Triggered Investigation</news:title><news:keywords>israel, cybersafe</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1427288221-8847/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-29T09:02:28+03:00</news:publication_date>
      <news:title>Vect Ransomware: Bug Turns Encryption into Irreversible Data Wiper</news:title><news:keywords>israel</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-35155/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-29T08:16:04+03:00</news:publication_date>
      <news:title>Dell iDRAC10 Vulnerability: Low-Privilege Race Condition Grants High Access</news:title><news:keywords>vulnerability, cve, high-severity, race-condition, cwe-522</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-42615/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-29T07:16:41+03:00</news:publication_date>
      <news:title>GCHQ CyberChef XSS Vulnerability (CVE-2026-42615) Identified</news:title><news:keywords>vulnerability, cve, high-severity, cross-site-scripting-xss, cwe-79</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-23773/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-29T07:16:40+03:00</news:publication_date>
      <news:title>CVE-2026-23773 — Server-Side Request Forgery</news:title><news:keywords>vulnerability, cve, medium-severity, server-side-request-forgery, cwe-918</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-42167/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-29T02:16:20+03:00</news:publication_date>
      <news:title>CVE-2026-42167: ProFTPD mod_sql RCE Via Log Expansion</news:title><news:keywords>vulnerability, cve, high-severity, cwe-89</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7319/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-29T01:16:52+03:00</news:publication_date>
      <news:title>CVE-2026-7319: Path Traversal in elinsky execution-system-mcp Poses Remote Risk</news:title><news:keywords>vulnerability, cve, high-severity, path-traversal, cwe-22</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7318/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-29T01:16:51+03:00</news:publication_date>
      <news:title>CVE-2026-7318 — Elie Mcp-Project Path Traversal</news:title><news:keywords>vulnerability, cve, medium-severity, path-traversal, cwe-22</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7317/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-29T01:16:51+03:00</news:publication_date>
      <news:title>CVE-2026-7317 — Grav CMS Insecure Deserialization</news:title><news:keywords>vulnerability, cve, medium-severity, insecure-deserialization, cwe-20, cwe-502</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7316/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-29T01:16:51+03:00</news:publication_date>
      <news:title>CVE-2026-7316: Aider-mcp Command Injection Exposes AI Dev Workflows</news:title><news:keywords>vulnerability, cve, high-severity, command-injection, cwe-74, cwe-77</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7315/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-29T01:16:51+03:00</news:publication_date>
      <news:title>CVE-2026-7315: eiceblue spire-pdf-mcp-server Path Traversal Vulnerability</news:title><news:keywords>vulnerability, cve, high-severity, path-traversal, cwe-22</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7314/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-29T01:16:51+03:00</news:publication_date>
      <news:title>CVE-2026-7314: eiceblue spire-doc-mcp-server Path Traversal Publicly Exploited</news:title><news:keywords>vulnerability, cve, high-severity, path-traversal, cwe-22</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7306/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-29T01:16:51+03:00</news:publication_date>
      <news:title>CVE-2026-7306 — Xuxueli Xxl-Job Vulnerability</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-320, cwe-321</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-7305/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-29T01:16:50+03:00</news:publication_date>
      <news:title>CVE-2026-7305 — Server-Side Request Forgery</news:title><news:keywords>vulnerability, cve, medium-severity, server-side-request-forgery, cwe-918</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41649/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-29T01:16:49+03:00</news:publication_date>
      <news:title>Outline Insecure Direct Object Reference (CVE-2026-41649) Exposes Documents</news:title><news:keywords>vulnerability, cve, high-severity, cwe-639</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-33467/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-29T01:16:48+03:00</news:publication_date>
      <news:title>CVE-2026-33467 — Improper Verification of Cryptographic Signature (CWE-347)</news:title><news:keywords>vulnerability, cve, medium-severity, cwe-347</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/spy-agency-officials-say-job-loss-anxiety-moving-fast-safe-x3o7u/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-29T00:43:20+03:00</news:publication_date>
      <news:title>NGA Grapples with AI Workforce Overhaul and Job Anxiety</news:title><news:keywords>threat-intel, policy, government, microsoft, tools</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/hackers-are-exploiting-a-critical-litellm-pre-auth-sqli-flaw-kdccf/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-29T00:07:23+03:00</news:publication_date>
      <news:title>LiteLLM Pre-Auth SQLi Actively Exploited: CVE-2026-42208</news:title><news:keywords>threat-intel, data-breach, malware, vulnerability, ai-security</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nsa-chief-during-snowden-affair-shares-regrets-reflections-pagdy/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-28T23:38:59+03:00</news:publication_date>
      <news:title>NSA Chief Reflects on Snowden Leaks: Lessons for CISOs</news:title><news:keywords>threat-intel, tools</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/daily-digest/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-28T23:00:00+03:00</news:publication_date>
      <news:title>Daily Security Digest — 2026-04-28</news:title><news:keywords>daily-digest, vulnerability, cve, critical, high-severity, command-injection, cwe-77, cwe-78, privilege-escalation, cwe-269</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-42431/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-28T22:37:47+03:00</news:publication_date>
      <news:title>CVE-2026-42431: OpenClaw Vulnerability Allows Persistent Browser Profile Mutation</news:title><news:keywords>vulnerability, cve, high-severity, cwe-863</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-42426/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-28T22:37:46+03:00</news:publication_date>
      <news:title>OpenClaw CVE-2026-42426: Improper Authorization Allows Node Pairing Bypass</news:title><news:keywords>vulnerability, cve, high-severity, cwe-863</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-42422/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-28T22:37:45+03:00</news:publication_date>
      <news:title>OpenClaw CVE-2026-42422: Role Bypass Allows Unapproved Token Minting</news:title><news:keywords>vulnerability, cve, high-severity, cwe-863</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41914/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-28T22:37:45+03:00</news:publication_date>
      <news:title>OpenClaw QQ Bot SSRF Vulnerability Bypasses Protections (CVE-2026-41914)</news:title><news:keywords>vulnerability, cve, high-severity, server-side-request-forgery, cwe-918</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41404/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-28T22:37:43+03:00</news:publication_date>
      <news:title>OpenClaw Privilege Escalation via Incomplete Scope Clearing (CVE-2026-41404)</news:title><news:keywords>vulnerability, cve, high-severity, privilege-escalation, cwe-863</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41394/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-28T22:37:42+03:00</news:publication_date>
      <news:title>OpenClaw CVE-2026-41394: Authentication Bypass Grants Operator Write Scopes</news:title><news:keywords>vulnerability, cve, high-severity, authentication-bypass, cwe-862</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41387/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-28T22:37:41+03:00</news:publication_date>
      <news:title>OpenClaw Incomplete Host Environment Sanitization Allows Package Overrides</news:title><news:keywords>vulnerability, cve, high-severity, cwe-183</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41386/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-28T22:37:41+03:00</news:publication_date>
      <news:title>OpenClaw Privilege Escalation: Critical Flaw in Device Pairing</news:title><news:keywords>vulnerability, cve, critical, high-severity, privilege-escalation, cwe-648</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41384/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-28T22:37:41+03:00</news:publication_date>
      <news:title>OpenClaw CLI Vulnerability Allows Code Execution via Environment Variable Injection</news:title><news:keywords>vulnerability, cve, high-severity, code-execution, cwe-15</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41383/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-28T22:37:41+03:00</news:publication_date>
      <news:title>CVE-2026-41383: OpenClaw Arbitrary Directory Deletion Flaw Exposes Remote Data</news:title><news:keywords>vulnerability, cve, high-severity, cwe-22</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-41378/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-28T22:37:40+03:00</news:publication_date>
      <news:title>OpenClaw Privilege Escalation (CVE-2026-41378) Allows RCE via Paired Nodes</news:title><news:keywords>vulnerability, cve, high-severity, remote-code-execution, cwe-862</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-3893/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-28T22:37:39+03:00</news:publication_date>
      <news:title>CVE-2026-3893: Carlson VASCO-B GNSS Receiver Lacks Authentication</news:title><news:keywords>vulnerability, cve, critical, high-severity, cwe-306</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-24222/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-28T22:36:45+03:00</news:publication_date>
      <news:title>NVIDIA NeMoClaw Vulnerability Exposes Host Environment Variables</news:title><news:keywords>vulnerability, cve, high-severity, information-disclosure, cwe-497</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-24186/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-28T22:36:45+03:00</news:publication_date>
      <news:title>NVIDIA FLARE SDK Vulnerability: Untrusted Deserialization Leads to RCE</news:title><news:keywords>vulnerability, cve, high-severity, code-execution, cwe-502</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/nvd-CVE-2026-24178/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-28T22:36:45+03:00</news:publication_date>
      <news:title>NVIDIA NVFlare Dashboard: Critical Auth Bypass Puts Systems at Risk</news:title><news:keywords>vulnerability, cve, critical, high-severity, code-execution, cwe-639</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/vidar-rises-to-top-of-chaotic-infostealer-market-emmj1/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-28T22:07:16+03:00</news:publication_date>
      <news:title>Vidar Infostealer Dominates Post-Takedown Market Vacuum</news:title><news:keywords>threat-intel, tools, malware</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1542954397-4548/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-28T21:03:18+03:00</news:publication_date>
      <news:title>XChat Lacks True E2E, Metadata Exposure Persists</news:title><news:keywords></news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1427288221-8844/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-28T20:53:48+03:00</news:publication_date>
      <news:title>GitHub RCE Vulnerability Exposes Millions of Repositories</news:title><news:keywords>israel</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/telegram-1427288221-8843/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-28T20:42:07+03:00</news:publication_date>
      <news:title>Ynet, Population Authority Project Pulled Over Data Exposure Flaw</news:title><news:keywords>israel</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/brazilian-lofygang-resurfaces-after-three-years-with-minecra-g3nbk/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-28T20:39:00+03:00</news:publication_date>
      <news:title>LofyGang Resurfaces, Targets Minecraft Players with LofyStealer Malware</news:title><news:keywords>threat-intel, vulnerability, malware</news:keywords>
    </news:news>
  </url><url>
    <loc>https://shimiscyberworld.com/posts/cyber-command-nsa-chief-warns-foreign-adversaries-likely-to-2x8o0/</loc>
    <news:news>
      <news:publication>
        <news:name>Shimi's Cyber World</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-28T20:26:00+03:00</news:publication_date>
      <news:title>Cyber Command Warns Foreign Adversaries Targeting Midterm Elections</news:title><news:keywords>threat-intel, data-breach, government</news:keywords>
    </news:news>
  </url></urlset>
