<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9"
        xmlns:news="http://www.google.com/schemas/sitemap-news/0.9">
  <url>
    <loc>https://vibewshield.com/news/cve-2026-42897-exchange-server-exploited-crafted-email</loc>
    <news:news>
      <news:publication>
        <news:name>VibeWShield</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-15T06:19:04.000Z</news:publication_date>
      <news:title><![CDATA[CVE-2026-42897: Exchange Server Exploited via Email]]></news:title>
      <news:keywords>CVE-2026-42897, Microsoft Exchange, email security, on-premises vulnerability, remote code execution</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://vibewshield.com/news/stealer-backdoor-node-ipc-versions-developer-secrets</loc>
    <news:news>
      <news:publication>
        <news:name>VibeWShield</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-14T17:22:43.000Z</news:publication_date>
      <news:title><![CDATA[Stealer Backdoor Found in 3 Node-IPC Versions]]></news:title>
      <news:keywords>supply-chain, npm, node-ipc, backdoor, developer-security</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://vibewshield.com/news/pan-os-rce-curl-bug-ai-tokenizer-attacks-bulletin</loc>
    <news:news>
      <news:publication>
        <news:name>VibeWShield</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-14T16:07:46.000Z</news:publication_date>
      <news:title><![CDATA[PAN-OS RCE, cURL Bug, AI Tokenizer Attacks: News]]></news:title>
      <news:keywords>PAN-OS RCE, cURL vulnerability, AI tokenizer attacks, web security, DAST</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://vibewshield.com/news/praison-ai-cve-2026-44338-auth-bypass-exploited</loc>
    <news:news>
      <news:publication>
        <news:name>VibeWShield</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-14T11:40:14.000Z</news:publication_date>
      <news:title><![CDATA[PraisonAI CVE-2026-44338 Auth Bypass Exploited Fast]]></news:title>
      <news:keywords>CVE-2026-44338, authentication bypass, PraisonAI, zero-day, AI security</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://vibewshield.com/news/ai-hallucinations-creating-real-security-risks</loc>
    <news:news>
      <news:publication>
        <news:name>VibeWShield</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-14T11:30:00.000Z</news:publication_date>
      <news:title><![CDATA[AI Hallucinations Are Creating Real Security Risks]]></news:title>
      <news:keywords>AI security, supply chain, developer security, LLM vulnerabilities</news:keywords>
    </news:news>
  </url>
</urlset>