<?xml version="1.0" encoding="UTF-8"?>
<!--generator='jetpack-15.7.1'-->
<!--Jetpack_Sitemap_Buffer_News_XMLWriter-->
<?xml-stylesheet type="text/xsl" href="//insicurezzadigitale.com/news-sitemap.xsl"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:news="http://www.google.com/schemas/sitemap-news/0.9" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd">
 <url>
  <loc>https://insicurezzadigitale.com/stealtok-130-000-utenti-spiati-da-12-estensioni-browser-mascherate-da-downloader-tiktok/</loc>
  <lastmod>2026-04-25T12:33:32Z</lastmod>
  <news:news>
   <news:publication>
    <news:name>(in)sicurezza digitale</news:name>
    <news:language>it</news:language>
   </news:publication>
   <news:title>StealTok: 130.000 utenti spiati da 12 estensioni browser mascherate da downloader TikTok</news:title>
   <news:publication_date>2026-04-25T12:33:32Z</news:publication_date>
   <news:genres>Blog</news:genres>
  </news:news>
 </url>
 <url>
  <loc>https://insicurezzadigitale.com/gopherwhisper-il-nuovo-apt-cinese-che-spia-il-governo-mongolo-nascondendo-il-c2-in-slack-discord-e-outlook/</loc>
  <lastmod>2026-04-24T18:17:28Z</lastmod>
  <news:news>
   <news:publication>
    <news:name>(in)sicurezza digitale</news:name>
    <news:language>it</news:language>
   </news:publication>
   <news:title>GopherWhisper: il nuovo APT cinese che spia il governo mongolo nascondendo il C2 in Slack, Discord e Outlook</news:title>
   <news:publication_date>2026-04-24T18:17:28Z</news:publication_date>
   <news:genres>Blog</news:genres>
  </news:news>
 </url>
 <url>
  <loc>https://insicurezzadigitale.com/fast16-il-framework-di-cybersabotaggio-pre-stuxnet-riemerso-dai-tool-segreti-nsa-dei-shadowbrokers/</loc>
  <lastmod>2026-04-24T09:06:00Z</lastmod>
  <news:news>
   <news:publication>
    <news:name>(in)sicurezza digitale</news:name>
    <news:language>it</news:language>
   </news:publication>
   <news:title>fast16: il framework di cybersabotaggio pre-Stuxnet riemerso dai tool segreti NSA dei ShadowBrokers</news:title>
   <news:publication_date>2026-04-24T09:05:59Z</news:publication_date>
   <news:genres>Blog</news:genres>
  </news:news>
 </url>
 <url>
  <loc>https://insicurezzadigitale.com/contagious-interview-diventa-un-worm-void-dokkaebi-trasforma-750-repository-in-vettori-auto-propaganti-contro-gli-sviluppatori/</loc>
  <lastmod>2026-04-24T06:42:15Z</lastmod>
  <news:news>
   <news:publication>
    <news:name>(in)sicurezza digitale</news:name>
    <news:language>it</news:language>
   </news:publication>
   <news:title>Contagious Interview diventa un worm: Void Dokkaebi trasforma 750 repository in vettori auto-propaganti contro gli sviluppatori</news:title>
   <news:publication_date>2026-04-24T06:42:14Z</news:publication_date>
   <news:genres>Blog</news:genres>
  </news:news>
 </url>
 <url>
  <loc>https://insicurezzadigitale.com/checkmarx-nel-mirino-di-teampcp-limmagine-docker-ufficiale-di-kics-trojanizzata-per-esfiltrare-i-segreti-dellinfrastruttura/</loc>
  <lastmod>2026-04-23T12:32:07Z</lastmod>
  <news:news>
   <news:publication>
    <news:name>(in)sicurezza digitale</news:name>
    <news:language>it</news:language>
   </news:publication>
   <news:title>Checkmarx nel mirino di TeamPCP: l&amp;#8217;immagine Docker ufficiale di KICS trojanizzata per esfiltrare i segreti dell&amp;#8217;infrastruttura</news:title>
   <news:publication_date>2026-04-23T12:32:05Z</news:publication_date>
   <news:genres>Blog</news:genres>
  </news:news>
 </url>
</urlset>
