<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9"
        xmlns:news="http://www.google.com/schemas/sitemap-news/0.9">
  <url>
    <loc>https://vibewshield.com/news/vm2-nodejs-sandbox-escape-arbitrary-code-execution</loc>
    <news:news>
      <news:publication>
        <news:name>VibeWShield</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-07T04:15:00.000Z</news:publication_date>
      <news:title><![CDATA[vm2 Node.js Sandbox Escape Enables Code Execution]]></news:title>
      <news:keywords>vm2, Node.js, sandbox escape, arbitrary code execution, JavaScript security</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://vibewshield.com/news/ai-agents-inside-network-perimeter-security-risks</loc>
    <news:news>
      <news:publication>
        <news:name>VibeWShield</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-06T10:57:00.000Z</news:publication_date>
      <news:title><![CDATA[AI Agents Inside Your Perimeter: What Are They Doing?]]></news:title>
      <news:keywords>AI security, agentic AI, network perimeter, zero trust, DAST</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://vibewshield.com/news/apache-http2-cve-2026-23918-dos-rce-vulnerability</loc>
    <news:news>
      <news:publication>
        <news:name>VibeWShield</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-05T16:19:00.000Z</news:publication_date>
      <news:title><![CDATA[Apache HTTP/2 CVE-2026-23918: DoS and RCE Risk]]></news:title>
      <news:keywords>Apache, CVE-2026-23918, HTTP/2, DoS, RCE</news:keywords>
    </news:news>
  </url>
</urlset>