<?xml version="1.0" encoding="UTF-8"?>
<!--generator='jetpack-15.7.1'-->
<!--Jetpack_Sitemap_Buffer_News_XMLWriter-->
<?xml-stylesheet type="text/xsl" href="//insicurezzadigitale.com/news-sitemap.xsl"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:news="http://www.google.com/schemas/sitemap-news/0.9" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd">
 <url>
  <loc>https://insicurezzadigitale.com/laptop-farm-dprk-smantellata-9-anni-a-kejia-wang-infiltrati-in-oltre-100-aziende-usa-e-rubato-codice-itar-a-un-defense-contractor/</loc>
  <lastmod>2026-04-17T13:43:49Z</lastmod>
  <news:news>
   <news:publication>
    <news:name>(in)sicurezza digitale</news:name>
    <news:language>it</news:language>
   </news:publication>
   <news:title>Laptop farm DPRK smantellata: 9 anni a Kejia Wang, infiltrati in oltre 100 aziende USA e rubato codice ITAR a un defense contractor</news:title>
   <news:publication_date>2026-04-17T13:43:48Z</news:publication_date>
   <news:genres>Blog</news:genres>
  </news:news>
 </url>
 <url>
  <loc>https://insicurezzadigitale.com/kong-rat-la-nuova-campagna-di-seo-poisoning-con-dropper-nativeaot-net-10-che-prende-di-mira-gli-sviluppatori-cinesi/</loc>
  <lastmod>2026-04-17T08:54:22Z</lastmod>
  <news:news>
   <news:publication>
    <news:name>(in)sicurezza digitale</news:name>
    <news:language>it</news:language>
   </news:publication>
   <news:title>Kong RAT: la nuova campagna di SEO poisoning con dropper NativeAOT .NET 10 che prende di mira gli sviluppatori cinesi</news:title>
   <news:publication_date>2026-04-17T08:54:20Z</news:publication_date>
   <news:genres>Blog</news:genres>
  </news:news>
 </url>
 <url>
  <loc>https://insicurezzadigitale.com/qilin-e-warlock-byovd-come-il-ransomware-disabilita-300-soluzioni-edr-utilizzando-driver-vulnerabili/</loc>
  <lastmod>2026-04-16T15:08:07Z</lastmod>
  <news:news>
   <news:publication>
    <news:name>(in)sicurezza digitale</news:name>
    <news:language>it</news:language>
   </news:publication>
   <news:title>Qilin e Warlock BYOVD: come il ransomware disabilita 300+ soluzioni EDR utilizzando driver vulnerabili</news:title>
   <news:publication_date>2026-04-16T15:08:07Z</news:publication_date>
   <news:genres>Blog</news:genres>
  </news:news>
 </url>
 <url>
  <loc>https://insicurezzadigitale.com/apt28-prismex-la-suite-malware-di-spionaggio-dellesercito-russo-colpisce-lucraina-e-gli-alleati-nato/</loc>
  <lastmod>2026-04-16T09:27:32Z</lastmod>
  <news:news>
   <news:publication>
    <news:name>(in)sicurezza digitale</news:name>
    <news:language>it</news:language>
   </news:publication>
   <news:title>APT28 PRISMEX: la suite malware di spionaggio dell&amp;#039;esercito russo colpisce l&amp;#039;Ucraina e gli alleati NATO</news:title>
   <news:publication_date>2026-04-16T09:27:30Z</news:publication_date>
   <news:genres>Blog</news:genres>
  </news:news>
 </url>
 <url>
  <loc>https://insicurezzadigitale.com/handala-e-la-cyber-offensiva-delliran-6-petabyte-distrutti-e-149-terabyte-rubati-dallinfrastruttura-critica-di-dubai/</loc>
  <lastmod>2026-04-15T13:46:11Z</lastmod>
  <news:news>
   <news:publication>
    <news:name>(in)sicurezza digitale</news:name>
    <news:language>it</news:language>
   </news:publication>
   <news:title>Handala e la Cyber-Offensiva dell&amp;#039;Iran: 6 Petabyte distrutti e 149 Terabyte rubati dall&amp;#039;infrastruttura critica di Dubai</news:title>
   <news:publication_date>2026-04-15T13:46:10Z</news:publication_date>
   <news:genres>Blog</news:genres>
  </news:news>
 </url>
 <url>
  <loc>https://insicurezzadigitale.com/drift-protocol-il-piu-grande-furto-defi-del-2026-perpetrato-da-hacker-nord-coreani-con-una-campagna-di-social-engineering-durata-6-mesi/</loc>
  <lastmod>2026-04-15T13:49:07Z</lastmod>
  <news:news>
   <news:publication>
    <news:name>(in)sicurezza digitale</news:name>
    <news:language>it</news:language>
   </news:publication>
   <news:title>Drift Protocol: il più grande furto DeFi del 2026 perpetrato da hacker nord-coreani con una campagna di social engineering durata 6 mesi</news:title>
   <news:publication_date>2026-04-15T08:24:04Z</news:publication_date>
   <news:genres>Blog</news:genres>
  </news:news>
 </url>
</urlset>
