<?xml version="1.0" encoding="UTF-8"?><?xml-stylesheet type="text/xsl" href="//alertacibernews.com/wp-content/plugins/wordpress-seo/css/main-sitemap.xsl"?>
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd http://www.google.com/schemas/sitemap-image/1.1 http://www.google.com/schemas/sitemap-image/1.1/sitemap-image.xsd" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
	<url>
		<loc>http://alertacibernews.com/amenazas/nuevo-troyano-bancario-brasileno-tclbanker-amenaza-59-plataformas-financieras-y-criptomonedas/</loc>
		<lastmod>2026-05-09T06:01:05+00:00</lastmod>
		<image:image>
			<image:loc>http://alertacibernews.com/wp-content/uploads/2026/05/banking.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>http://alertacibernews.com/empresas/aplicaciones-fraudulentas-en-google-play-estafan-a-millones-simulando-acceso-a-historiales-de-llamadas/</loc>
		<lastmod>2026-05-09T06:01:23+00:00</lastmod>
		<image:image>
			<image:loc>http://alertacibernews.com/wp-content/uploads/2026/05/android-calls.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>http://alertacibernews.com/noticias/quasar-linux-rat-nuevo-implante-ataca-sistemas-de-desarrolladores-y-devops-para-robar-credenciales/</loc>
		<lastmod>2026-05-09T06:01:43+00:00</lastmod>
		<image:image>
			<image:loc>http://alertacibernews.com/wp-content/uploads/2026/05/kube.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>http://alertacibernews.com/opinion/la-ceguera-deliberada-en-los-soc-un-analisis-de-la-sobrecarga-de-alertas-y-su-impacto-real/</loc>
		<lastmod>2026-05-09T06:02:02+00:00</lastmod>
		<image:image>
			<image:loc>http://alertacibernews.com/wp-content/uploads/2026/05/ai-soc.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>http://alertacibernews.com/amenazas/pamdoora-nuevo-backdoor-pam-para-linux-emerge-en-foros-rusos-y-amenaza-la-seguridad-ssh/</loc>
		<lastmod>2026-05-09T06:02:22+00:00</lastmod>
		<image:image>
			<image:loc>http://alertacibernews.com/wp-content/uploads/2026/05/linux-pam.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>http://alertacibernews.com/vulnerabilidades/dirty-frag-nueva-vulnerabilidad-sin-parche-en-el-kernel-de-linux-permite-escalada-local-de-privilegios/</loc>
		<lastmod>2026-05-09T06:02:40+00:00</lastmod>
		<image:image>
			<image:loc>http://alertacibernews.com/wp-content/uploads/2026/05/linux.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>http://alertacibernews.com/opinion/la-evolucion-de-las-reglas-de-correlacion-en-kaspersky-unified-monitoring-and-analysis-platform-kuma/</loc>
		<lastmod>2026-05-09T06:02:54+00:00</lastmod>
		<image:image>
			<image:loc>http://alertacibernews.com/wp-content/uploads/2026/05/Kaspersky-siem-correlation-evolution-Featured.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>http://alertacibernews.com/empresas/apps-fraudulentas-en-google-play-prometian-historial-de-llamadas-de-cualquier-numero-y-superaron-los-siete-millones-de-descargas/</loc>
		<lastmod>2026-05-09T06:03:14+00:00</lastmod>
		<image:image>
			<image:loc>http://alertacibernews.com/wp-content/uploads/2026/05/lukas-stefanko.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>http://alertacibernews.com/noticias/por-que-sigue-siendo-posible-proteger-una-cuenta-online-unicamente-con-un-codigo-de-seis-digitos/</loc>
		<lastmod>2026-05-09T06:03:33+00:00</lastmod>
		<image:image>
			<image:loc>http://alertacibernews.com/wp-content/uploads/2026/05/MFE_5108-BW.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>http://alertacibernews.com/noticias/arrestado-un-hacker-ferroviario-detectado-backdoor-pamdoora-en-linux-y-nuevo-favorito-para-liderar-la-cisa/</loc>
		<lastmod>2026-05-09T06:03:46+00:00</lastmod>
		<image:image>
			<image:loc>http://alertacibernews.com/wp-content/uploads/2026/05/cybersecurity-news-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>http://alertacibernews.com/ataques/hackers-comprometen-sistemas-ics-en-cinco-plantas-de-tratamiento-de-agua-en-polonia-riesgo-directo-para-el-suministro-publico/</loc>
		<lastmod>2026-05-09T06:04:04+00:00</lastmod>
		<image:image>
			<image:loc>http://alertacibernews.com/wp-content/uploads/2026/05/Water-Cyberattacks.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>http://alertacibernews.com/empresas/filtracion-de-datos-en-braintrust-ciberatacantes-acceden-a-secretos-de-proveedores-de-ia-alojados-en-aws/</loc>
		<lastmod>2026-05-09T06:04:23+00:00</lastmod>
		<image:image>
			<image:loc>http://alertacibernews.com/wp-content/uploads/2026/05/AI_Risks.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>http://alertacibernews.com/amenazas/ciberataque-paraliza-canvas-el-sistema-de-gestion-educativa-de-miles-de-centros-en-plena-epoca-de-examenes/</loc>
		<lastmod>2026-05-09T06:04:38+00:00</lastmod>
		<image:image>
			<image:loc>http://alertacibernews.com/wp-content/uploads/2026/05/school-education.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>http://alertacibernews.com/noticias/pcpjack-nuevo-gusano-automatizado-compromete-entornos-cloud-y-web-y-elimina-competidores/</loc>
		<lastmod>2026-05-09T06:04:53+00:00</lastmod>
		<image:image>
			<image:loc>http://alertacibernews.com/wp-content/uploads/2026/05/malware-1.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>http://alertacibernews.com/noticias/ransomhouse-publica-pruebas-de-acceso-a-servicios-internos-de-trellix-tras-presunta-brecha/</loc>
		<lastmod>2026-05-09T06:05:06+00:00</lastmod>
		<image:image>
			<image:loc>http://alertacibernews.com/wp-content/uploads/2026/05/Trellix.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>http://alertacibernews.com/vulnerabilidades/extensiones-de-chrome-para-ia-en-el-punto-de-mira-vulnerabilidad-critica-en-claude-permite-secuestro-del-agente/</loc>
		<lastmod>2026-05-09T06:05:22+00:00</lastmod>
		<image:image>
			<image:loc>http://alertacibernews.com/wp-content/uploads/2026/05/Chrome.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>http://alertacibernews.com/amenazas/el-ataque-a-la-edtech-compromete-datos-personales-de-cientos-de-millones-de-usuarios/</loc>
		<lastmod>2026-05-09T06:05:35+00:00</lastmod>
		<image:image>
			<image:loc>http://alertacibernews.com/wp-content/uploads/2026/05/Instructure-Kristoffer_Tripplaar-Alamy.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>http://alertacibernews.com/amenazas/ataque-de-shinyhunters-a-instructure-nuevo-desafio-a-la-seguridad-de-los-lms-en-el-sector-educativo/</loc>
		<lastmod>2026-05-09T06:05:50+00:00</lastmod>
		<image:image>
			<image:loc>http://alertacibernews.com/wp-content/uploads/2026/05/Instructure_Timon_Schneider_Alamy.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>http://alertacibernews.com/noticias/20-acontecimientos-clave-que-transformaron-el-panorama-de-ciberseguridad-en-las-ultimas-dos-decadas/</loc>
		<lastmod>2026-05-09T06:06:06+00:00</lastmod>
		<image:image>
			<image:loc>http://alertacibernews.com/wp-content/uploads/2026/05/20-Ink_Drop-Alamy.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>http://alertacibernews.com/ataques/hackers-aprovechan-cloudz-rat-y-pheno-para-comprometer-la-sincronizacion-entre-windows-y-smartphones/</loc>
		<lastmod>2026-05-09T06:06:21+00:00</lastmod>
		<image:image>
			<image:loc>http://alertacibernews.com/wp-content/uploads/2026/05/smartphone_warning_Mohd_Izzuan_Roslan_Alamy.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>http://alertacibernews.com/amenazas/ataques-ciberneticos-contra-emiratos-arabes-unidos-se-triplican-durante-el-conflicto-con-iran/</loc>
		<lastmod>2026-05-09T06:06:37+00:00</lastmod>
		<image:image>
			<image:loc>http://alertacibernews.com/wp-content/uploads/2026/05/UAE-Cyber-Security-Council-Arnold_O_A_Pinto-shutterstock.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>http://alertacibernews.com/empresas/brecha-en-empresa-de-ciberseguridad-riesgo-de-exposicion-de-controles-y-detecciones/</loc>
		<lastmod>2026-05-09T06:06:49+00:00</lastmod>
		<image:image>
			<image:loc>http://alertacibernews.com/wp-content/uploads/2026/05/trellix_frantic_Alamy.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>http://alertacibernews.com/amenazas/el-cltc-de-uc-berkeley-refuerza-la-ciberseguridad-en-escuelas-gobiernos-locales-y-ong-ante-el-aumento-de-ciberataques/</loc>
		<lastmod>2026-05-09T06:07:00+00:00</lastmod>
		<image:image>
			<image:loc>http://alertacibernews.com/wp-content/uploads/2026/05/2XMCPR9.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>http://alertacibernews.com/vulnerabilidades/simulacros-de-seguridad-efectivos-claves-para-identificar-vulnerabilidades-reales-mas-alla-del-cumplimiento/</loc>
		<lastmod>2026-05-09T06:07:11+00:00</lastmod>
		<image:image>
			<image:loc>http://alertacibernews.com/wp-content/uploads/2026/05/pentest_dizain_shutterstock.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>http://alertacibernews.com/amenazas/grave-vulnerabilidad-permite-a-administradores-robar-contrasenas-y-escalar-ataques-en-sistemas-corporativos/</loc>
		<lastmod>2026-05-09T06:07:23+00:00</lastmod>
		<image:image>
			<image:loc>http://alertacibernews.com/wp-content/uploads/2026/05/Passwords-1800_designer491_Alamy.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>http://alertacibernews.com/vulnerabilidades/actualizaciones-criticas-en-cpanel-y-whm-tres-vulnerabilidades-permiten-escalada-de-privilegios-y-ejecucion-de-codigo/</loc>
		<lastmod>2026-05-10T06:02:58+00:00</lastmod>
		<image:image>
			<image:loc>http://alertacibernews.com/wp-content/uploads/2026/05/cpanel-3.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>http://alertacibernews.com/amenazas/el-experimento-de-los-usb-trampa-asi-nacio-uno-de-los-vectores-de-ataque-social-mas-efectivos/</loc>
		<lastmod>2026-05-10T06:03:09+00:00</lastmod>
		<image:image>
			<image:loc>http://alertacibernews.com/wp-content/uploads/2026/05/dark-reading-confidential-logo-sq.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>http://alertacibernews.com/noticias/el-sitio-web-oficial-de-jdownloader-comprometido-para-distribuir-instaladores-maliciosos-en-windows-y-linux/</loc>
		<lastmod>2026-05-10T06:03:19+00:00</lastmod>
		<image:image>
			<image:loc>http://alertacibernews.com/wp-content/uploads/2026/05/jdownloader-header.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>http://alertacibernews.com/amenazas/hugging-face-trending-repositorio-falso-de-privacy-filter-distribuye-malware-en-windows/</loc>
		<lastmod>2026-05-10T06:03:28+00:00</lastmod>
		<image:image>
			<image:loc>http://alertacibernews.com/wp-content/uploads/2026/05/hacker_box.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>http://alertacibernews.com/noticias/filtracion-de-datos-en-nvidia-geforce-now-expone-informacion-sensible-de-usuarios/</loc>
		<lastmod>2026-05-10T06:03:36+00:00</lastmod>
		<image:image>
			<image:loc>http://alertacibernews.com/wp-content/uploads/2026/05/NVIDIA.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>http://alertacibernews.com/amenazas/soc-bajo-presion-como-la-ia-acelera-la-investigacion-de-alertas-y-refuerza-la-defensa-ante-amenazas/</loc>
		<lastmod>2026-05-10T06:03:49+00:00</lastmod>
		<image:image>
			<image:loc>http://alertacibernews.com/wp-content/uploads/2026/05/prophet-agentic-ai-robots.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>http://alertacibernews.com/amenazas/ransomhouse-reivindica-el-ataque-al-repositorio-de-codigo-fuente-de-trellix-y-filtra-pruebas-de-acceso/</loc>
		<lastmod>2026-05-10T06:04:00+00:00</lastmod>
		<image:image>
			<image:loc>http://alertacibernews.com/wp-content/uploads/2026/05/TrellixRansomHouse.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>http://alertacibernews.com/vulnerabilidades/cisa-exige-accion-urgente-ante-vulnerabilidad-critica-en-ivanti-epmm-explotada-como-zero-day/</loc>
		<lastmod>2026-05-10T06:04:09+00:00</lastmod>
		<image:image>
			<image:loc>http://alertacibernews.com/wp-content/uploads/2026/05/Ivanti-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>http://alertacibernews.com/amenazas/ciberataque-a-zara-filtrados-datos-personales-de-mas-de-197-000-clientes-tras-acceso-no-autorizado/</loc>
		<lastmod>2026-05-10T06:04:18+00:00</lastmod>
		<image:image>
			<image:loc>http://alertacibernews.com/wp-content/uploads/2026/05/Zara_headpic_red.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>http://alertacibernews.com/noticias/excontratista-de-virginia-condenado-por-sabotaje-masivo-de-bases-de-datos-federales-tras-su-despido/</loc>
		<lastmod>2026-05-10T06:04:27+00:00</lastmod>
		<image:image>
			<image:loc>http://alertacibernews.com/wp-content/uploads/2026/05/Hackers.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>http://alertacibernews.com/vulnerabilidades/dirty-frag-nuevo-exploit-zero-day-permite-escalada-instantanea-a-root-en-linux/</loc>
		<lastmod>2026-05-10T06:04:35+00:00</lastmod>
		<image:image>
			<image:loc>http://alertacibernews.com/wp-content/uploads/2026/05/Dirty-Frag-Linux.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>http://alertacibernews.com/amenazas/shinyhunters-compromete-de-nuevo-instructure-ataque-masivo-a-portales-canvas-universitarios/</loc>
		<lastmod>2026-05-10T06:04:46+00:00</lastmod>
		<image:image>
			<image:loc>http://alertacibernews.com/wp-content/uploads/2026/05/canvas-logo.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>http://alertacibernews.com/noticias/tclbanker-nuevo-troyano-apunta-a-59-plataformas-financieras-mediante-un-instalador-msi-manipulado/</loc>
		<lastmod>2026-05-10T06:04:56+00:00</lastmod>
		<image:image>
			<image:loc>http://alertacibernews.com/wp-content/uploads/2026/05/emoji-hacker.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>http://alertacibernews.com/amenazas/pcpjack-el-nuevo-framework-de-malware-que-compromete-infraestructuras-cloud-y-expulsa-a-competidores/</loc>
		<lastmod>2026-05-10T06:05:07+00:00</lastmod>
		<image:image>
			<image:loc>http://alertacibernews.com/wp-content/uploads/2026/05/cloud.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>http://alertacibernews.com/amenazas/nueva-campana-de-malware-en-australia-utiliza-ingenieria-social-clickfix-para-propagar-vidar-stealer/</loc>
		<lastmod>2026-05-10T06:05:15+00:00</lastmod>
		<image:image>
			<image:loc>http://alertacibernews.com/wp-content/uploads/2026/05/Aus.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>http://alertacibernews.com/vulnerabilidades/grave-vulnerabilidad-zero-day-en-ivanti-epmm-permite-ejecucion-remota-de-codigo-alerta-maxima-para-administradores/</loc>
		<lastmod>2026-05-10T06:05:24+00:00</lastmod>
		<image:image>
			<image:loc>http://alertacibernews.com/wp-content/uploads/2026/05/Ivanti-headpic.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>http://alertacibernews.com/empresas/las-actividades-en-el-navegador-superan-los-controles-de-seguridad-tradicionales-un-riesgo-creciente-para-la-empresa/</loc>
		<lastmod>2026-05-10T06:05:33+00:00</lastmod>
		<image:image>
			<image:loc>http://alertacibernews.com/wp-content/uploads/2026/05/dlp-header.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>http://alertacibernews.com/vulnerabilidades/vulnerabilidad-critica-en-ollama-expone-memoria-de-proceso-a-atacantes-remotos-no-autenticados/</loc>
		<lastmod>2026-05-11T06:01:01+00:00</lastmod>
		<image:image>
			<image:loc>http://alertacibernews.com/wp-content/uploads/2026/05/oll.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>http://alertacibernews.com/amenazas/mas-de-500-organizaciones-afectadas-por-una-campana-de-phishing-persistente-dirigida-a-sectores-criticos/</loc>
		<lastmod>2026-05-11T06:01:14+00:00</lastmod>
		<image:image>
			<image:loc>http://alertacibernews.com/wp-content/uploads/2026/05/AI-phishing-1.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>http://alertacibernews.com/amenazas/campana-de-malvertising-explota-google-ads-y-chats-de-claude-ai-para-distribuir-malware-en-macos/</loc>
		<lastmod>2026-05-11T06:01:28+00:00</lastmod>
		<image:image>
			<image:loc>http://alertacibernews.com/wp-content/uploads/2026/05/Claude_AI.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>http://alertacibernews.com/noticias/desmantelado-el-resurgido-crimenetwork-alemania-bloquea-el-mercado-criminal-que-genero-mas-de-36-millones-de-euros/</loc>
		<lastmod>2026-05-11T06:01:49+00:00</lastmod>
		<image:image>
			<image:loc>http://alertacibernews.com/wp-content/uploads/2026/05/Law_enforcement_arrest.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>http://alertacibernews.com/amenazas/uno-de-cada-cinco-ataques-de-ransomware-a-empresas-podria-haberse-evitado-segun-el-informe-de-stoik/</loc>
		<lastmod>2026-05-12T06:01:11+00:00</lastmod>
		<image:image>
			<image:loc>http://alertacibernews.com/wp-content/uploads/2026/05/Imagen-fondo-6.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>http://alertacibernews.com/amenazas/la-inteligencia-artificial-impulsa-una-oleada-de-ciberataques-y-obliga-a-redefinir-la-resiliencia-empresarial/</loc>
		<lastmod>2026-05-12T06:01:33+00:00</lastmod>
		<image:image>
			<image:loc>http://alertacibernews.com/wp-content/uploads/2026/05/vtrtdxyjtu.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>http://alertacibernews.com/empresas/el-75-de-las-empresas-carece-de-visibilidad-sobre-credenciales-corporativas-segun-zoho/</loc>
		<lastmod>2026-05-12T06:01:51+00:00</lastmod>
		<image:image>
			<image:loc>http://alertacibernews.com/wp-content/uploads/2026/05/ciberataques.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>http://alertacibernews.com/noticias/automatizacion-del-cumplimiento-en-ciberseguridad-clave-estrategica-ante-auditorias-y-regulaciones/</loc>
		<lastmod>2026-05-12T06:02:07+00:00</lastmod>
		<image:image>
			<image:loc>http://alertacibernews.com/wp-content/uploads/2026/05/TANIA-475-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>http://alertacibernews.com/noticias/jenkins-marketplace-comprometido-detectan-version-modificada-del-plugin-ast-de-checkmarx/</loc>
		<lastmod>2026-05-12T06:02:23+00:00</lastmod>
		<image:image>
			<image:loc>http://alertacibernews.com/wp-content/uploads/2026/05/Jenkins.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>http://alertacibernews.com/amenazas/actor-de-amenazas-mr_rot13-explota-vulnerabilidad-critica-en-cpanel-para-desplegar-backdoor-filemanager/</loc>
		<lastmod>2026-05-12T06:02:45+00:00</lastmod>
		<image:image>
			<image:loc>http://alertacibernews.com/wp-content/uploads/2026/05/cpcp.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>http://alertacibernews.com/amenazas/actor-desconocido-utiliza-ia-para-crear-exploit-de-zero-day-google-alerta-sobre-un-nuevo-paradigma-en-ciberataques/</loc>
		<lastmod>2026-05-12T06:03:07+00:00</lastmod>
		<image:image>
			<image:loc>http://alertacibernews.com/wp-content/uploads/2026/05/ai-hacker.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>http://alertacibernews.com/amenazas/aumenta-el-numero-de-ataques-por-descarga-comprometida-y-explotacion-de-vulnerabilidades-antiguas/</loc>
		<lastmod>2026-05-12T06:03:35+00:00</lastmod>
		<image:image>
			<image:loc>http://alertacibernews.com/wp-content/uploads/2026/05/cyber-recap.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>http://alertacibernews.com/amenazas/la-defensa-nocturna-de-redes-revela-fallos-sistemicos-en-la-respuesta-ante-ciberamenazas/</loc>
		<lastmod>2026-05-12T06:03:55+00:00</lastmod>
		<image:image>
			<image:loc>http://alertacibernews.com/wp-content/uploads/2026/05/picus.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>http://alertacibernews.com/noticias/repositorio-malicioso-en-hugging-face-suplanta-modelo-de-openai-y-distribuye-infostealer-en-rust/</loc>
		<lastmod>2026-05-12T06:04:13+00:00</lastmod>
		<image:image>
			<image:loc>http://alertacibernews.com/wp-content/uploads/2026/05/hugging-face-malware.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>http://alertacibernews.com/proteccion-de-datos/gafas-inteligentes-un-nuevo-vector-de-riesgo-para-la-privacidad-y-la-seguridad-de-los-datos/</loc>
		<lastmod>2026-05-12T06:04:27+00:00</lastmod>
		<image:image>
			<image:loc>http://alertacibernews.com/wp-content/uploads/2026/05/Phil_Muncaster.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>http://alertacibernews.com/empresas/frame-security-capta-50-millones-de-dolares-para-revolucionar-la-formacion-en-ciberseguridad-empresarial/</loc>
		<lastmod>2026-05-12T06:04:42+00:00</lastmod>
		<image:image>
			<image:loc>http://alertacibernews.com/wp-content/uploads/2026/05/funding-investment-market-2.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>http://alertacibernews.com/amenazas/los-build-application-firewalls-emergen-como-defensa-clave-ante-ataques-a-la-cadena-de-suministro/</loc>
		<lastmod>2026-05-12T06:05:09+00:00</lastmod>
		<image:image>
			<image:loc>http://alertacibernews.com/wp-content/uploads/2026/05/NPM-code-software-development-1.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>http://alertacibernews.com/vulnerabilidades/google-detecta-el-primer-exploit-de-dia-cero-generado-por-ia-capaz-de-evadir-la-autenticacion-2fa/</loc>
		<lastmod>2026-05-12T06:05:29+00:00</lastmod>
		<image:image>
			<image:loc>http://alertacibernews.com/wp-content/uploads/2026/05/Zero-Day-Exploit-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>http://alertacibernews.com/vulnerabilidades/robo-de-datos-personales-en-la-tienda-online-de-skoda-tras-vulnerabilidad-explotada/</loc>
		<lastmod>2026-05-12T06:05:43+00:00</lastmod>
		<image:image>
			<image:loc>http://alertacibernews.com/wp-content/uploads/2026/05/cars.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>http://alertacibernews.com/noticias/cloudflare-despide-a-1-100-empleados-en-una-reestructuracion-impulsada-por-la-ia-tras-batir-previsiones/</loc>
		<lastmod>2026-05-12T06:06:03+00:00</lastmod>
		<image:image>
			<image:loc>http://alertacibernews.com/wp-content/uploads/2026/05/Cybersecurity-Layoffs.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>http://alertacibernews.com/opinion/sailpoint-revela-acceso-no-autorizado-a-su-repositorio-de-github-analisis-tecnico-del-incidente/</loc>
		<lastmod>2026-05-12T06:06:19+00:00</lastmod>
		<image:image>
			<image:loc>http://alertacibernews.com/wp-content/uploads/2026/05/coding-vulnerability-software-development.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>http://alertacibernews.com/amenazas/comprometen-el-plugin-checkmarx-ast-para-jenkins-en-un-ataque-a-la-cadena-de-suministro/</loc>
		<lastmod>2026-05-12T06:06:33+00:00</lastmod>
		<image:image>
			<image:loc>http://alertacibernews.com/wp-content/uploads/2026/05/NPM-code-software-development-2.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>http://alertacibernews.com/amenazas/miles-de-estudiantes-recuperan-el-acceso-a-canvas-tras-un-ciberataque-que-paralizo-escuelas-a-nivel-mundial/</loc>
		<lastmod>2026-05-12T06:06:48+00:00</lastmod>
		<image:image>
			<image:loc>http://alertacibernews.com/wp-content/uploads/2026/05/university-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>http://alertacibernews.com/vulnerabilidades/nueva-vulnerabilidad-dirty-frag-en-linux-dos-cve-criticos-sin-parche-y-con-evidencia-de-explotacion/</loc>
		<lastmod>2026-05-12T06:07:03+00:00</lastmod>
		<image:image>
			<image:loc>http://alertacibernews.com/wp-content/uploads/2026/05/Linux-2.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>http://alertacibernews.com/noticias/desmantelado-el-mercado-clandestino-crimenetwork-mas-de-22-000-usuarios-afectados-y-administrador-detenido/</loc>
		<lastmod>2026-05-12T06:07:18+00:00</lastmod>
		<image:image>
			<image:loc>http://alertacibernews.com/wp-content/uploads/2026/05/dark-web-marketplace.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>http://alertacibernews.com/noticias/fcc-relaja-plazos-pero-mantiene-la-prohibicion-a-routers-extranjeros-implicaciones-y-retos-para-la-ciberseguridad/</loc>
		<lastmod>2026-05-12T06:07:34+00:00</lastmod>
		<image:image>
			<image:loc>http://alertacibernews.com/wp-content/uploads/2026/05/router_Casezy_idea_shutterstock.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>http://alertacibernews.com/amenazas/los-empleados-ultima-barrera-ante-ataques-sofisticados-cuatro-escenarios-criticos/</loc>
		<lastmod>2026-05-12T06:07:48+00:00</lastmod>
		<image:image>
			<image:loc>http://alertacibernews.com/wp-content/uploads/2026/05/cyber_eye_Lightfield_Studios_Inc_Alamy.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>http://alertacibernews.com/vulnerabilidades/nueva-vulnerabilidad-de-escalada-de-privilegios-en-linux-pone-en-jaque-la-seguridad-de-servidores/</loc>
		<lastmod>2026-05-12T06:08:00+00:00</lastmod>
		<image:image>
			<image:loc>http://alertacibernews.com/wp-content/uploads/2026/05/bombs-Valeriy_Kachaev-Alamy.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>http://alertacibernews.com/vulnerabilidades/cibercriminales-aprovechan-modelos-de-lenguaje-avanzados-para-automatizar-el-desarrollo-de-exploits/</loc>
		<lastmod>2026-05-12T06:08:17+00:00</lastmod>
		<image:image>
			<image:loc>http://alertacibernews.com/wp-content/uploads/2026/05/AI_orchestration_NicoElNino_Alamy.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>http://alertacibernews.com/amenazas/actores-estatales-de-china-corea-del-norte-y-rusia-intensifican-el-uso-industrial-de-ia-en-ciberataques/</loc>
		<lastmod>2026-05-13T06:01:05+00:00</lastmod>
		<image:image>
			<image:loc>http://alertacibernews.com/wp-content/uploads/2026/05/ciberdelincuencia-2.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>http://alertacibernews.com/amenazas/espana-concentra-el-2-de-los-ataques-globales-de-ransomware-en-2026-segun-check-point-research/</loc>
		<lastmod>2026-05-13T06:01:24+00:00</lastmod>
		<image:image>
			<image:loc>http://alertacibernews.com/wp-content/uploads/2026/05/Kaspersky_Ransomware.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>http://alertacibernews.com/vulnerabilidades/grave-vulnerabilidad-dead-letter-en-exim-permite-ejecucion-de-codigo-remoto/</loc>
		<lastmod>2026-05-13T06:01:41+00:00</lastmod>
		<image:image>
			<image:loc>http://alertacibernews.com/wp-content/uploads/2026/05/exim.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>http://alertacibernews.com/amenazas/rubygems-suspende-nuevos-registros-tras-un-grave-ataque-malicioso-dirigido-a-la-cadena-de-suministro/</loc>
		<lastmod>2026-05-13T06:02:00+00:00</lastmod>
		<image:image>
			<image:loc>http://alertacibernews.com/wp-content/uploads/2026/05/rubygems.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>http://alertacibernews.com/noticias/nueva-variante-de-trickmo-utiliza-la-red-ton-para-evadir-deteccion-y-comprometer-banca-movil-en-europa/</loc>
		<lastmod>2026-05-13T06:02:13+00:00</lastmod>
		<image:image>
			<image:loc>http://alertacibernews.com/wp-content/uploads/2026/05/tricks.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>http://alertacibernews.com/opinion/por-que-las-alertas-mas-criticas-en-los-soc-quedan-sin-respuesta-analisis-de-causas-y-soluciones/</loc>
		<lastmod>2026-05-13T06:02:31+00:00</lastmod>
		<image:image>
			<image:loc>http://alertacibernews.com/wp-content/uploads/2026/05/Radiant-webinar.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>http://alertacibernews.com/amenazas/ataques-de-teampcp-comprometen-cadenas-de-suministro-en-npm-y-pypi-mediante-la-campana-mini-shai-hulud/</loc>
		<lastmod>2026-05-13T06:03:00+00:00</lastmod>
		<image:image>
			<image:loc>http://alertacibernews.com/wp-content/uploads/2026/05/mistral.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>http://alertacibernews.com/noticias/la-implementacion-de-ia-agentica-en-produccion-nuevos-desafios-de-seguridad-y-riesgos-ocultos/</loc>
		<lastmod>2026-05-13T06:03:22+00:00</lastmod>
		<image:image>
			<image:loc>http://alertacibernews.com/wp-content/uploads/2026/05/ai-agents.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>http://alertacibernews.com/amenazas/instructure-cierra-un-acuerdo-tras-el-ciberataque-a-canvas-analisis-tecnico-y-repercusiones/</loc>
		<lastmod>2026-05-13T06:03:41+00:00</lastmod>
		<image:image>
			<image:loc>http://alertacibernews.com/wp-content/uploads/2026/05/ransom-breach.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>http://alertacibernews.com/vulnerabilidades/openai-presenta-daybreak-ia-avanzada-para-deteccion-y-correccion-proactiva-de-vulnerabilidades/</loc>
		<lastmod>2026-05-13T06:04:04+00:00</lastmod>
		<image:image>
			<image:loc>http://alertacibernews.com/wp-content/uploads/2026/05/openai-daybreak.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>http://alertacibernews.com/empresas/apple-refuerza-la-seguridad-de-las-comunicaciones-con-cifrado-e2e-en-rcs-en-ios-26-5/</loc>
		<lastmod>2026-05-13T06:04:25+00:00</lastmod>
		<image:image>
			<image:loc>http://alertacibernews.com/wp-content/uploads/2026/05/e2ee-rcs.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>http://alertacibernews.com/amenazas/servidores-de-ollama-lm-studio-autogpt-y-langserve-bajo-ataque-llmjacking-una-amenaza-en-auge/</loc>
		<lastmod>2026-05-13T06:04:43+00:00</lastmod>
		<image:image>
			<image:loc>http://alertacibernews.com/wp-content/uploads/2026/05/llmjacking-2026-private-ai-server-security-featured.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>http://alertacibernews.com/vulnerabilidades/microsoft-soluciona-137-vulnerabilidades-criticas-en-azure-windows-dynamics-365-y-plugins-sso-de-jira-y-confluence/</loc>
		<lastmod>2026-05-13T06:05:07+00:00</lastmod>
		<image:image>
			<image:loc>http://alertacibernews.com/wp-content/uploads/2026/05/Windows-10.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>http://alertacibernews.com/noticias/exaforce-capta-125-millones-para-potenciar-su-plataforma-soc-orientada-a-agentes-inteligentes/</loc>
		<lastmod>2026-05-13T06:05:23+00:00</lastmod>
		<image:image>
			<image:loc>http://alertacibernews.com/wp-content/uploads/2026/05/cyber-security-investment-1.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>http://alertacibernews.com/vulnerabilidades/adobe-corrige-52-vulnerabilidades-criticas-en-10-productos-riesgos-de-ejecucion-remota-de-codigo/</loc>
		<lastmod>2026-05-13T06:05:40+00:00</lastmod>
		<image:image>
			<image:loc>http://alertacibernews.com/wp-content/uploads/2026/05/Adobe.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>http://alertacibernews.com/noticias/white-circle-capta-11-millones-de-dolares-para-potenciar-su-plataforma-de-control-basada-en-ia/</loc>
		<lastmod>2026-05-13T06:05:53+00:00</lastmod>
		<image:image>
			<image:loc>http://alertacibernews.com/wp-content/uploads/2026/05/funding-investment-market-3-1.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>http://alertacibernews.com/amenazas/ciberataque-a-bwh-hotels-seis-meses-de-exposicion-de-datos-de-reservas-revelan-fallos-criticos-en-la-seguridad/</loc>
		<lastmod>2026-05-13T06:06:07+00:00</lastmod>
		<image:image>
			<image:loc>http://alertacibernews.com/wp-content/uploads/2026/05/Best-Western.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>http://alertacibernews.com/amenazas/campana-crpx0-malware-multiplataforma-que-usa-falsos-onlyfans-gratis-para-atacar-macos-y-windows/</loc>
		<lastmod>2026-05-13T06:06:27+00:00</lastmod>
		<image:image>
			<image:loc>http://alertacibernews.com/wp-content/uploads/2026/05/Malware-Hunter-Killer.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>http://alertacibernews.com/noticias/acuerdo-con-ciberdelincuentes-para-eliminar-datos-robados-en-la-plataforma-educativa-canvas/</loc>
		<lastmod>2026-05-13T06:06:43+00:00</lastmod>
		<image:image>
			<image:loc>http://alertacibernews.com/wp-content/uploads/2026/05/school-education-1.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>http://alertacibernews.com/amenazas/west-pharmaceutical-services-sufre-un-ataque-de-ransomware-que-paraliza-operaciones-globales/</loc>
		<lastmod>2026-05-13T06:06:58+00:00</lastmod>
		<image:image>
			<image:loc>http://alertacibernews.com/wp-content/uploads/2026/05/West-Pharmaceutical-Services.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>http://alertacibernews.com/vulnerabilidades/apple-corrige-decenas-de-vulnerabilidades-criticas-en-macos-e-ios-incluyendo-fallo-de-recuperacion-de-chats-eliminados/</loc>
		<lastmod>2026-05-13T06:07:18+00:00</lastmod>
		<image:image>
			<image:loc>http://alertacibernews.com/wp-content/uploads/2026/05/Apple-MacBook-iPhone.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>http://alertacibernews.com/vulnerabilidades/sap-corrige-vulnerabilidades-criticas-en-s-4hana-y-commerce-capaces-de-permitir-ejecucion-de-codigo/</loc>
		<lastmod>2026-05-13T06:07:35+00:00</lastmod>
		<image:image>
			<image:loc>http://alertacibernews.com/wp-content/uploads/2026/05/SAP-1.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>http://alertacibernews.com/vulnerabilidades/microsoft-lanza-su-patch-tuesday-de-junio-sin-zero-days-pero-con-137-vulnerabilidades-a-corregir/</loc>
		<lastmod>2026-05-13T06:07:51+00:00</lastmod>
		<image:image>
			<image:loc>http://alertacibernews.com/wp-content/uploads/2026/05/swbug_Andrii_Yalanskyi_shutterstock.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>http://alertacibernews.com/vulnerabilidades/vulnerabilidad-en-libreria-tokenizer-de-hugging-face-permite-secuestro-de-salidas-y-exfiltracion-de-datos/</loc>
		<lastmod>2026-05-13T06:08:08+00:00</lastmod>
		<image:image>
			<image:loc>http://alertacibernews.com/wp-content/uploads/2026/05/Hugging_Face_Sidney_Van_den_Boogaard_Alamy.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>http://alertacibernews.com/empresas/los-20-protagonistas-que-han-redefinido-la-gestion-del-riesgo-en-ciberseguridad-empresarial/</loc>
		<lastmod>2026-05-13T06:08:22+00:00</lastmod>
		<image:image>
			<image:loc>http://alertacibernews.com/wp-content/uploads/2026/05/architect-Artur_Marciniec-alamy.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>http://alertacibernews.com/vulnerabilidades/vulnerabilidad-critica-en-chips-qualcomm-expone-a-millones-de-dispositivos-moviles-e-iot/</loc>
		<lastmod>2026-05-14T06:01:06+00:00</lastmod>
		<image:image>
			<image:loc>http://alertacibernews.com/wp-content/uploads/2026/05/fibratel_moviles-corporativos.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>http://alertacibernews.com/amenazas/nueva-oleada-de-phishing-aprovecha-bubble-io-para-burlar-filtros-y-comprometer-credenciales/</loc>
		<lastmod>2026-05-14T06:01:24+00:00</lastmod>
		<image:image>
			<image:loc>http://alertacibernews.com/wp-content/uploads/2026/05/campana-de-phishing-2.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>http://alertacibernews.com/vulnerabilidades/microsoft-presenta-mdash-el-nuevo-sistema-de-inteligencia-artificial-para-deteccion-y-remediacion-masiva-de-vulnerabilidades/</loc>
		<lastmod>2026-05-14T06:01:38+00:00</lastmod>
		<image:image>
			<image:loc>http://alertacibernews.com/wp-content/uploads/2026/05/windows-ai.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>http://alertacibernews.com/amenazas/ciberataque-atribuido-a-famoussparrow-compromete-a-empresa-petrolera-de-azerbaiyan/</loc>
		<lastmod>2026-05-14T06:01:52+00:00</lastmod>
		<image:image>
			<image:loc>http://alertacibernews.com/wp-content/uploads/2026/05/energy-cyberattack.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>http://alertacibernews.com/vulnerabilidades/las-cadenas-letales-como-los-atacantes-combinan-vulnerabilidades-menores-para-comprometer-entornos-cloud/</loc>
		<lastmod>2026-05-14T06:02:07+00:00</lastmod>
		<image:image>
			<image:loc>http://alertacibernews.com/wp-content/uploads/2026/05/wiz.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>http://alertacibernews.com/vulnerabilidades/el-tiempo-de-explotacion-supera-al-de-parcheo-retos-criticos-en-la-gestion-de-vulnerabilidades/</loc>
		<lastmod>2026-05-14T06:02:23+00:00</lastmod>
		<image:image>
			<image:loc>http://alertacibernews.com/wp-content/uploads/2026/05/pentera.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>http://alertacibernews.com/vulnerabilidades/microsoft-corrige-138-vulnerabilidades-criticas-en-su-ultimo-patch-tuesday-analisis-y-recomendaciones/</loc>
		<lastmod>2026-05-14T06:02:39+00:00</lastmod>
		<image:image>
			<image:loc>http://alertacibernews.com/wp-content/uploads/2026/05/windows-patch-update.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>http://alertacibernews.com/noticias/campana-gemstuffer-exfiltracion-de-datos-a-traves-de-rubygems-detectada-en-mas-de-150-paquetes/</loc>
		<lastmod>2026-05-14T06:02:54+00:00</lastmod>
		<image:image>
			<image:loc>http://alertacibernews.com/wp-content/uploads/2026/05/rubygemss.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>http://alertacibernews.com/amenazas/google-refuerza-la-seguridad-de-android-con-intrusion-logging-para-detectar-spyware-avanzado/</loc>
		<lastmod>2026-05-14T06:03:11+00:00</lastmod>
		<image:image>
			<image:loc>http://alertacibernews.com/wp-content/uploads/2026/05/adnroid-Intrusion-Logging.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>http://alertacibernews.com/amenazas/foxconn-confirma-ciberataque-en-sus-fabricas-norteamericanas-el-grupo-nitrogen-roba-8-tb-de-datos-confidenciales/</loc>
		<lastmod>2026-05-14T06:03:27+00:00</lastmod>
		<image:image>
			<image:loc>http://alertacibernews.com/wp-content/uploads/2026/05/Foxconn.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>http://alertacibernews.com/vulnerabilidades/microsoft-y-palo-alto-networks-identifican-decenas-de-vulnerabilidades-en-su-propio-codigo-mediante-ia/</loc>
		<lastmod>2026-05-14T06:03:40+00:00</lastmod>
		<image:image>
			<image:loc>http://alertacibernews.com/wp-content/uploads/2026/05/AI_Weight-Models.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>http://alertacibernews.com/amenazas/la-nueva-plataforma-sweet-attack-emplea-inteligencia-en-tiempo-real-y-red-teaming-autonomo-para-detectar-cadenas-de-ataque-avanzadas/</loc>
		<lastmod>2026-05-14T06:04:02+00:00</lastmod>
		<image:image>
			<image:loc>http://alertacibernews.com/wp-content/uploads/2026/05/Cybersecurity_News-SecurityWeek-2.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>http://alertacibernews.com/noticias/como-los-equipos-de-seguridad-ot-pueden-transformar-costes-en-valor-mediante-la-resiliencia/</loc>
		<lastmod>2026-05-14T06:04:18+00:00</lastmod>
		<image:image>
			<image:loc>http://alertacibernews.com/wp-content/uploads/2026/05/claroty-OT_webinar-scaled-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>http://alertacibernews.com/noticias/el-gobierno-exige-explicaciones-a-instructure-tras-la-brecha-y-caida-de-canvas/</loc>
		<lastmod>2026-05-14T06:04:31+00:00</lastmod>
		<image:image>
			<image:loc>http://alertacibernews.com/wp-content/uploads/2026/05/plead-guilty-hacker-court.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>http://alertacibernews.com/noticias/716-000-usuarios-afectados-por-la-brecha-de-datos-en-la-plataforma-de-telemedicina-openloop-health/</loc>
		<lastmod>2026-05-14T06:04:46+00:00</lastmod>
		<image:image>
			<image:loc>http://alertacibernews.com/wp-content/uploads/2026/05/healthcare-medical.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>http://alertacibernews.com/vulnerabilidades/microsoft-corrige-una-vulnerabilidad-critica-de-zero-click-en-outlook-que-pone-en-jaque-a-las-empresas/</loc>
		<lastmod>2026-05-14T06:05:00+00:00</lastmod>
		<image:image>
			<image:loc>http://alertacibernews.com/wp-content/uploads/2026/05/Microsoft-Outlook-CVE-2023-23397.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>http://alertacibernews.com/vulnerabilidades/fortinet-e-ivanti-corrigen-vulnerabilidades-criticas-con-riesgo-de-ejecucion-remota-de-codigo/</loc>
		<lastmod>2026-05-14T06:05:13+00:00</lastmod>
		<image:image>
			<image:loc>http://alertacibernews.com/wp-content/uploads/2026/05/software-vulnerability-patch-update.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>http://alertacibernews.com/vulnerabilidades/intel-y-amd-corrigen-70-vulnerabilidades-criticas-en-su-patch-tuesday-de-junio/</loc>
		<lastmod>2026-05-14T06:05:30+00:00</lastmod>
		<image:image>
			<image:loc>http://alertacibernews.com/wp-content/uploads/2026/05/chipmaker-patch-tuesday.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>http://alertacibernews.com/amenazas/cientos-de-paquetes-maliciosos-obligan-a-rubygems-a-suspender-nuevas-altas-tras-un-ataque-masivo/</loc>
		<lastmod>2026-05-14T06:05:46+00:00</lastmod>
		<image:image>
			<image:loc>http://alertacibernews.com/wp-content/uploads/2026/05/coding-vulnerability-software-development-1.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>http://alertacibernews.com/noticias/nuevas-soluciones-de-ciberseguridad-abordan-las-carencias-en-la-gobernanza-y-gestion-de-riesgos/</loc>
		<lastmod>2026-05-14T06:05:58+00:00</lastmod>
		<image:image>
			<image:loc>http://alertacibernews.com/wp-content/uploads/2026/05/Risk1800_Andriy_Popov_Alamy.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>http://alertacibernews.com/amenazas/amenaza-en-rubygems-detectados-paquetes-maliciosos-con-scrapers-dirigidos-a-servidores-publicos-del-gobierno-britanico/</loc>
		<lastmod>2026-05-14T06:06:16+00:00</lastmod>
		<image:image>
			<image:loc>http://alertacibernews.com/wp-content/uploads/2026/05/ruby_Zerilli_Media_Alamy.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>http://alertacibernews.com/amenazas/el-error-de-opsec-de-un-grupo-ransomware-revela-su-modelo-de-exito-y-estructura-interna/</loc>
		<lastmod>2026-05-14T06:06:30+00:00</lastmod>
		<image:image>
			<image:loc>http://alertacibernews.com/wp-content/uploads/2026/05/Top_hats-Guy_Corbishley-Alamy.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>http://alertacibernews.com/noticias/dark-reading-celebra-20-anos-como-referente-en-ciberseguridad-con-una-serie-especial-de-contenidos/</loc>
		<lastmod>2026-05-14T06:06:44+00:00</lastmod>
		<image:image>
			<image:loc>http://alertacibernews.com/wp-content/uploads/2026/05/325351_DR23_Graphics_General_Large_Text_v1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>http://alertacibernews.com/amenazas/ataques-recurrentes-de-un-grupo-chino-de-amenaza-persistente-avanzada-comprometen-a-empresa-petrolera-azerbaiyana/</loc>
		<lastmod>2026-05-14T06:07:01+00:00</lastmod>
		<image:image>
			<image:loc>http://alertacibernews.com/wp-content/uploads/2026/05/pair-of-java-sparrows-Alen_Thien-shutterstock.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>http://alertacibernews.com/amenazas/ciberataques-automatizados-con-ia-nuevas-campanas-dirigidas-a-mexico-y-brasil-elevan-el-riesgo-para-empresas/</loc>
		<lastmod>2026-05-14T06:07:16+00:00</lastmod>
		<image:image>
			<image:loc>http://alertacibernews.com/wp-content/uploads/2026/05/evil_robot_Anna_Vaczi_Alamy.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>http://alertacibernews.com/amenazas/la-ia-multiplica-los-vectores-de-ataque-contra-sistemas-de-identidad-corporativos-analisis-y-recomendaciones/</loc>
		<lastmod>2026-05-15T06:01:10+00:00</lastmod>
		<image:image>
			<image:loc>http://alertacibernews.com/wp-content/uploads/2026/05/gfkghlk.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>http://alertacibernews.com/empresas/el-auge-de-la-ia-en-las-empresas-riesgos-desafios-y-el-momento-mythos-en-la-ciberseguridad/</loc>
		<lastmod>2026-05-15T06:01:57+00:00</lastmod>
		<image:image>
			<image:loc>http://alertacibernews.com/wp-content/uploads/2026/05/netscope.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>http://alertacibernews.com/vulnerabilidades/cisa-alerta-sobre-vulnerabilidad-critica-en-cisco-catalyst-sd-wan-cve-2026-20182-permite-bypass-de-autenticacion/</loc>
		<lastmod>2026-05-15T06:02:35+00:00</lastmod>
		<image:image>
			<image:loc>http://alertacibernews.com/wp-content/uploads/2026/05/cisa-exploit.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>http://alertacibernews.com/amenazas/grave-vulnerabilidad-de-autenticacion-en-cisco-catalyst-sd-wan-controller-ataques-activos-y-mitigacion-urgente/</loc>
		<lastmod>2026-05-15T06:03:05+00:00</lastmod>
		<image:image>
			<image:loc>http://alertacibernews.com/wp-content/uploads/2026/05/cisco-exploit.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>http://alertacibernews.com/noticias/paquete-npm-node-ipc-comprometido-versiones-maliciosas-detectadas-en-entornos-de-desarrollo/</loc>
		<lastmod>2026-05-15T06:03:43+00:00</lastmod>
		<image:image>
			<image:loc>http://alertacibernews.com/wp-content/uploads/2026/05/node.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>http://alertacibernews.com/amenazas/el-auge-de-ataques-en-la-cadena-de-suministro-digital-viejas-debilidades-y-nuevas-amenazas/</loc>
		<lastmod>2026-05-15T06:04:18+00:00</lastmod>
		<image:image>
			<image:loc>http://alertacibernews.com/wp-content/uploads/2026/05/threatsday-2.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>http://alertacibernews.com/noticias/ghostwriter-intensifica-su-ofensiva-nuevas-campanas-de-ciberespionaje-contra-organismos-ucranianos/</loc>
		<lastmod>2026-05-15T06:04:47+00:00</lastmod>
		<image:image>
			<image:loc>http://alertacibernews.com/wp-content/uploads/2026/05/uk.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>http://alertacibernews.com/vulnerabilidades/ciberdelincuentes-aprovechan-vulnerabilidad-critica-en-praisonai-horas-tras-su-divulgacion/</loc>
		<lastmod>2026-05-15T06:05:28+00:00</lastmod>
		<image:image>
			<image:loc>http://alertacibernews.com/wp-content/uploads/2026/05/praison.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>http://alertacibernews.com/noticias/las-alucinaciones-de-la-ia-un-nuevo-vector-de-riesgo-para-la-toma-de-decisiones-en-infraestructuras-criticas/</loc>
		<lastmod>2026-05-15T06:06:22+00:00</lastmod>
		<image:image>
			<image:loc>http://alertacibernews.com/wp-content/uploads/2026/05/keeper.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>http://alertacibernews.com/amenazas/bitlocker-y-ctfmon-bajo-ataque-dos-nuevas-vulnerabilidades-zero-day-amenazan-la-seguridad-de-windows/</loc>
		<lastmod>2026-05-15T06:06:52+00:00</lastmod>
		<image:image>
			<image:loc>http://alertacibernews.com/wp-content/uploads/2026/05/windowss.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>http://alertacibernews.com/vulnerabilidades/nueva-variante-fragnesia-cve-2026-46300-tercera-escalada-de-privilegios-critica-en-linux-en-dos-semanas/</loc>
		<lastmod>2026-05-15T06:07:51+00:00</lastmod>
		<image:image>
			<image:loc>http://alertacibernews.com/wp-content/uploads/2026/05/linux-2.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>http://alertacibernews.com/vulnerabilidades/vulnerabilidad-critica-en-nginx-permanece-18-anos-oculta-riesgo-alto-de-ejecucion-remota-de-codigo/</loc>
		<lastmod>2026-05-15T06:08:45+00:00</lastmod>
		<image:image>
			<image:loc>http://alertacibernews.com/wp-content/uploads/2026/05/nn.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>http://alertacibernews.com/noticias/refuerzo-de-la-seguridad-en-centros-de-datos-para-ia-sin-sacrificar-el-rendimiento/</loc>
		<lastmod>2026-05-15T06:09:18+00:00</lastmod>
		<image:image>
			<image:loc>http://alertacibernews.com/wp-content/uploads/2026/05/Data-center-Cybersecurity.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>http://alertacibernews.com/vulnerabilidades/nueva-vulnerabilidad-fragnesia-en-el-kernel-de-linux-permite-escalada-de-privilegios-a-root/</loc>
		<lastmod>2026-05-15T06:09:43+00:00</lastmod>
		<image:image>
			<image:loc>http://alertacibernews.com/wp-content/uploads/2026/05/Linux-malware-1.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>http://alertacibernews.com/vulnerabilidades/mythos-destaca-en-auditorias-de-codigo-fuente-y-analisis-de-binarios-pero-muestra-carencias-en-validacion-de-exploits/</loc>
		<lastmod>2026-05-15T06:10:08+00:00</lastmod>
		<image:image>
			<image:loc>http://alertacibernews.com/wp-content/uploads/2026/05/coding-vulnerability-software-development-2.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>http://alertacibernews.com/noticias/akamai-refuerza-su-oferta-zero-trust-con-la-adquisicion-de-layerx-por-205-millones-de-dolares/</loc>
		<lastmod>2026-05-15T06:10:36+00:00</lastmod>
		<image:image>
			<image:loc>http://alertacibernews.com/wp-content/uploads/2026/05/MA-mergers-and-acquisitions-1.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>http://alertacibernews.com/amenazas/ciberataques-de-apts-chinas-salt-typhoon-y-twill-typhoon-amplian-objetivos-y-mejoran-sus-herramientas/</loc>
		<lastmod>2026-05-15T06:10:58+00:00</lastmod>
		<image:image>
			<image:loc>http://alertacibernews.com/wp-content/uploads/2026/05/Chinese-Technology-Cyberwar.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>http://alertacibernews.com/noticias/los-paises-del-g7-publican-una-guia-sobre-sbom-de-ia-para-reforzar-la-transparencia-y-la-seguridad/</loc>
		<lastmod>2026-05-15T06:11:39+00:00</lastmod>
		<image:image>
			<image:loc>http://alertacibernews.com/wp-content/uploads/2026/05/SBOM_Regulations-Function.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>http://alertacibernews.com/vulnerabilidades/f5-soluciona-mas-de-50-vulnerabilidades-criticas-y-medias-en-big-ip-big-iq-y-nginx/</loc>
		<lastmod>2026-05-15T06:12:12+00:00</lastmod>
		<image:image>
			<image:loc>http://alertacibernews.com/wp-content/uploads/2026/05/F5-Vulnerability.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>http://alertacibernews.com/vulnerabilidades/hackers-explotan-vulnerabilidad-critica-en-praisonai-apenas-horas-tras-su-divulgacion-publica/</loc>
		<lastmod>2026-05-15T06:12:36+00:00</lastmod>
		<image:image>
			<image:loc>http://alertacibernews.com/wp-content/uploads/2026/05/AI-assistant-chatbot-artificial-intelligence.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>http://alertacibernews.com/vulnerabilidades/broadcom-corrige-una-vulnerabilidad-critica-en-vmware-fusion-tras-su-exposicion-en-pwn2own-berlin/</loc>
		<lastmod>2026-05-15T06:12:56+00:00</lastmod>
		<image:image>
			<image:loc>http://alertacibernews.com/wp-content/uploads/2026/05/VMWare.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>http://alertacibernews.com/noticias/descubiertas-las-zero-days-yellowkey-y-greenplasma-riesgos-criticos-para-la-seguridad-en-entornos-windows/</loc>
		<lastmod>2026-05-15T06:13:29+00:00</lastmod>
		<image:image>
			<image:loc>http://alertacibernews.com/wp-content/uploads/2026/05/Windows-Kernel-BSOD.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>http://alertacibernews.com/amenazas/ataque-con-radio-definida-por-software-interrumpe-el-servicio-de-trenes-bala-en-taiwan-y-activa-alerta-antiterrorista/</loc>
		<lastmod>2026-05-15T06:13:49+00:00</lastmod>
		<image:image>
			<image:loc>http://alertacibernews.com/wp-content/uploads/2026/05/taiwan-bullet-trains-eric1207cvb-shutterstock.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>http://alertacibernews.com/amenazas/adquisicion-estrategica-refuerza-la-visibilidad-en-ecosistemas-de-terceros-ante-el-auge-de-ataques-a-la-cadena-de-suministro/</loc>
		<lastmod>2026-05-15T06:14:13+00:00</lastmod>
		<image:image>
			<image:loc>http://alertacibernews.com/wp-content/uploads/2026/05/threat_intelligence_1800_Futuristic_overlay_Alamy.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>http://alertacibernews.com/amenazas/ataques-explotan-vulnerabilidades-criticas-cvss-10-0-en-cisco-implicaciones-para-la-seguridad-empresarial/</loc>
		<lastmod>2026-05-15T06:14:35+00:00</lastmod>
		<image:image>
			<image:loc>http://alertacibernews.com/wp-content/uploads/2026/05/Cisco-MTP-Alamy.jpg</image:loc>
		</image:image>
	</url>
</urlset>
<!-- XML Sitemap generated by Yoast SEO -->