<?xml version="1.0" encoding="UTF-8"?>
<?xml-stylesheet type="text/xsl" href="https://cyberdefensa.mx/wp-sitemap.xsl" ?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9"><url><loc>https://cyberdefensa.mx/journey-of-a-thousand-miles-starts-with-a-single-step-2/</loc><lastmod>2019-04-04T12:02:44+00:00</lastmod></url><url><loc>https://cyberdefensa.mx/markup-image-alignment/</loc><lastmod>2018-09-11T01:47:50+00:00</lastmod></url><url><loc>https://cyberdefensa.mx/a-paginated-post/</loc><lastmod>2018-09-13T02:17:12+00:00</lastmod></url><url><loc>https://cyberdefensa.mx/vertical-featured-image-with-disabled-comments/</loc><lastmod>2018-09-05T18:20:37+00:00</lastmod></url><url><loc>https://cyberdefensa.mx/media-embeds/</loc><lastmod>2018-09-17T02:26:08+00:00</lastmod></url><url><loc>https://cyberdefensa.mx/testing-comments-paginated/</loc><lastmod>2018-09-19T02:29:08+00:00</lastmod></url><url><loc>https://cyberdefensa.mx/i-dont-have-a-featured-image/</loc><lastmod>2018-09-15T02:54:58+00:00</lastmod></url><url><loc>https://cyberdefensa.mx/markup-html-tags-and-formatting/</loc><lastmod>2018-09-15T02:20:34+00:00</lastmod></url><url><loc>https://cyberdefensa.mx/mobile-apps-leading-industry-performers-of-this-year-based-on-uq-analytics/</loc><lastmod>2019-03-08T12:30:24+00:00</lastmod></url><url><loc>https://cyberdefensa.mx/the-laid-back-approach-to-develop-your-custom-style/</loc><lastmod>2019-04-02T20:38:52+00:00</lastmod></url><url><loc>https://cyberdefensa.mx/why-businesses-should-have-a-healthy-work-culture/</loc><lastmod>2019-03-13T20:30:41+00:00</lastmod></url><url><loc>https://cyberdefensa.mx/increase-your-productivity-as-an-online-web-designer/</loc><lastmod>2019-03-19T15:40:22+00:00</lastmod></url><url><loc>https://cyberdefensa.mx/una-falla-de-roguepilot-en-github-codespaces-permitio-que-copilot-filtrara-github_token/</loc><lastmod>2026-02-25T00:05:01+00:00</lastmod></url><url><loc>https://cyberdefensa.mx/una-falla-de-roguepilot-en-github-codespaces-permitio-que-copilot-filtrara-github_token-2/</loc><lastmod>2026-02-25T00:05:02+00:00</lastmod></url><url><loc>https://cyberdefensa.mx/uac-0050-apunta-a-una-institucion-financiera-europea-con-dominio-falsificado-y-malware-rms/</loc><lastmod>2026-02-25T00:05:10+00:00</lastmod></url><url><loc>https://cyberdefensa.mx/la-priorizacion-de-la-identidad-no-es-un-problema-de-acumulacion/</loc><lastmod>2026-02-25T00:05:19+00:00</lastmod></url><url><loc>https://cyberdefensa.mx/lazarus-group-utiliza-medusa-ransomware-en-ataques-a-la-atencion-medica-en-medio-oriente-y-ee-uu/</loc><lastmod>2026-02-25T00:05:23+00:00</lastmod></url><url><loc>https://cyberdefensa.mx/unsolicitedbooker-apunta-a-las-telecomunicaciones-de-asia-central-con-puertas-traseras-lucidoor-y-marssnake/</loc><lastmod>2026-02-25T00:06:40+00:00</lastmod></url><url><loc>https://cyberdefensa.mx/anthropic-dice-que-las-empresas-chinas-de-inteligencia-artificial-utilizaron-16-millones-de-consultas-de-claude-para-copiar-el-modelo/</loc><lastmod>2026-02-25T00:06:44+00:00</lastmod></url><url><loc>https://cyberdefensa.mx/apt28-apunto-a-entidades-europeas-que-utilizan-malware-macro-basado-en-webhook/</loc><lastmod>2026-02-25T00:06:49+00:00</lastmod></url><url><loc>https://cyberdefensa.mx/la-campana-wormable-xmrig-utiliza-el-exploit-byovd-y-la-bomba-logica-basada-en-el-tiempo/</loc><lastmod>2026-02-25T00:06:55+00:00</lastmod></url><url><loc>https://cyberdefensa.mx/double-tap-skimmers-promptspy-ai-30tbps-ddos-docker-malware-more/</loc><lastmod>2026-02-25T00:06:59+00:00</lastmod></url><url><loc>https://cyberdefensa.mx/como-los-puntos-finales-expuestos-aumentan-el-riesgo-en-toda-la-infraestructura-llm/</loc><lastmod>2026-02-25T00:07:05+00:00</lastmod></url><url><loc>https://cyberdefensa.mx/los-paquetes-npm-maliciosos-recolectan-claves-criptograficas-secretos-de-ci-y-tokens-api/</loc><lastmod>2026-02-25T00:07:10+00:00</lastmod></url><url><loc>https://cyberdefensa.mx/muddywater-se-dirige-a-organizaciones-mena-con-ghostfetch-char-y-http_vip/</loc><lastmod>2026-02-25T00:07:15+00:00</lastmod></url><url><loc>https://cyberdefensa.mx/un-actor-de-amenazas-asistido-por-ia-compromete-mas-de-600-dispositivos-fortigate-en-55-paises/</loc><lastmod>2026-02-25T00:07:21+00:00</lastmod></url><url><loc>https://cyberdefensa.mx/anthropic-lanza-claude-code-security-para-escaneo-de-vulnerabilidades-impulsado-por-ia/</loc><lastmod>2026-02-25T00:15:08+00:00</lastmod></url><url><loc>https://cyberdefensa.mx/cisa-agrega-dos-fallas-de-roundcube-explotadas-activamente-al-catalogo-kev/</loc><lastmod>2026-02-25T00:15:10+00:00</lastmod></url><url><loc>https://cyberdefensa.mx/ec-council-amplia-su-cartera-de-certificaciones-de-ia-para-fortalecer-la-preparacion-y-la-seguridad-de-la-fuerza-laboral-de-ia-de-ee-uu/</loc><lastmod>2026-02-25T00:15:11+00:00</lastmod></url><url><loc>https://cyberdefensa.mx/falla-de-beyondtrust-utilizada-para-shells-web-puertas-traseras-y-filtracion-de-datos/</loc><lastmod>2026-02-25T00:15:12+00:00</lastmod></url><url><loc>https://cyberdefensa.mx/cline-cli-2-3-0-supply-chain-attack-instalo-openclaw-en-sistemas-de-desarrolladores/</loc><lastmod>2026-02-25T00:15:13+00:00</lastmod></url><url><loc>https://cyberdefensa.mx/la-campana-clickfix-abusa-de-sitios-comprometidos-para-implementar-malware-mimicrat/</loc><lastmod>2026-02-25T00:15:14+00:00</lastmod></url><url><loc>https://cyberdefensa.mx/la-nueva-metrica-que-dara-forma-al-ciberseguro-en-2026/</loc><lastmod>2026-02-25T00:15:16+00:00</lastmod></url><url><loc>https://cyberdefensa.mx/nacional-ucraniano-condenado-a-5-anos-en-caso-de-fraude-a-trabajadores-de-ti-en-corea-del-norte/</loc><lastmod>2026-02-25T00:15:17+00:00</lastmod></url><url><loc>https://cyberdefensa.mx/el-fbi-informa-1-900-incidentes-de-jackpotting-en-cajeros-automaticos-desde-2020-y-20-millones-de-dolares-perdidos-en-2025/</loc><lastmod>2026-02-25T00:15:18+00:00</lastmod></url><url><loc>https://cyberdefensa.mx/ex-ingenieros-de-google-acusados-de-transferencias-de-secretos-comerciales-a-iran/</loc><lastmod>2026-02-25T00:15:20+00:00</lastmod></url><url><loc>https://cyberdefensa.mx/el-malware-promptspy-para-android-abusa-de-la-ia-de-gemini-para-automatizar-la-persistencia-de-aplicaciones-recientes/</loc><lastmod>2026-02-25T00:15:21+00:00</lastmod></url><url><loc>https://cyberdefensa.mx/la-operacion-tarjeta-roja-2-0-de-interpol-detiene-a-651-personas-en-la-represion-de-la-ciberdelincuencia-en-africa/</loc><lastmod>2026-02-25T00:15:22+00:00</lastmod></url><url><loc>https://cyberdefensa.mx/microsoft-parchea-la-escalada-de-privilegios-cve-2026-26119-en-windows-admin-center/</loc><lastmod>2026-02-25T00:15:22+00:00</lastmod></url><url><loc>https://cyberdefensa.mx/openssl-rce-foxit-0-days-copilot-leak-ai-password-flaws-20-stories/</loc><lastmod>2026-02-25T00:58:25+00:00</lastmod></url><url><loc>https://cyberdefensa.mx/como-la-ia-colapsa-su-ventana-de-respuesta/</loc><lastmod>2026-02-25T02:04:39+00:00</lastmod></url><url><loc>https://cyberdefensa.mx/aplicaciones-falsas-de-iptv-difunden-malware-masivo-en-android-dirigido-a-usuarios-de-banca-movil/</loc><lastmod>2026-02-25T03:14:30+00:00</lastmod></url><url><loc>https://cyberdefensa.mx/la-campana-crescentharvest-ataca-a-los-partidarios-de-las-protestas-en-iran-con-malware-rat/</loc><lastmod>2026-02-25T04:35:00+00:00</lastmod></url><url><loc>https://cyberdefensa.mx/citizen-lab-encuentra-herramienta-cellebrite-utilizada-en-el-telefono-de-un-activista-keniano-bajo-custodia-policial/</loc><lastmod>2026-02-25T06:00:13+00:00</lastmod></url><url><loc>https://cyberdefensa.mx/cisa-confirma-la-explotacion-activa-de-la-vulnerabilidad-filezen-cve-2026-25108/</loc><lastmod>2026-02-25T07:02:08+00:00</lastmod></url><url><loc>https://cyberdefensa.mx/solarwinds-parchea-4-fallas-criticas-de-serv-u-15-5-que-permiten-la-ejecucion-del-codigo-raiz/</loc><lastmod>2026-02-25T08:29:39+00:00</lastmod></url><url><loc>https://cyberdefensa.mx/empleado-de-un-contratista-de-defensa-encarcelado-por-vender-8-dias-cero-a-un-corredor-ruso/</loc><lastmod>2026-02-25T09:31:41+00:00</lastmod></url><url><loc>https://cyberdefensa.mx/telefonos-voip-grandstream-gxp1600-expuestos-a-ejecucion-remota-de-codigo-no-autenticado/</loc><lastmod>2026-02-25T10:58:57+00:00</lastmod></url><url><loc>https://cyberdefensa.mx/los-procesos-manuales-estan-poniendo-en-riesgo-la-seguridad-nacional/</loc><lastmod>2026-02-25T12:06:16+00:00</lastmod></url><url><loc>https://cyberdefensa.mx/defectos-criticos-encontrados-en-cuatro-extensiones-de-codigo-vs-con-mas-de-125-millones-de-instalaciones/</loc><lastmod>2026-02-25T13:12:42+00:00</lastmod></url><url><loc>https://cyberdefensa.mx/paquetes-maliciosos-de-nuget-robaron-datos-de-asp-net-paquete-npm-eliminado-malware/</loc><lastmod>2026-02-25T14:14:59+00:00</lastmod></url><url><loc>https://cyberdefensa.mx/operating-in-a-world-of-permanent-instability/</loc><lastmod>2026-02-25T15:25:50+00:00</lastmod></url><url><loc>https://cyberdefensa.mx/slh-ofrece-entre-500-y-1000-dolares-por-llamada-para-reclutar-mujeres-para-ataques-de-vishing-a-la-mesa-de-ayuda-de-ti/</loc><lastmod>2026-02-25T16:26:24+00:00</lastmod></url><url><loc>https://cyberdefensa.mx/cinco-formas-principales-en-las-que-la-clasificacion-incompleta-aumenta-el-riesgo-empresarial-en-lugar-de-reducirlo/</loc><lastmod>2026-02-25T17:27:02+00:00</lastmod></url><url><loc>https://cyberdefensa.mx/las-fallas-del-codigo-claude-permiten-la-ejecucion-remota-de-codigo-y-la-filtracion-de-claves-api/</loc><lastmod>2026-02-25T18:28:01+00:00</lastmod></url><url><loc>https://cyberdefensa.mx/google-interrumpe-la-campana-gridtide-unc2814-despues-de-53-infracciones-en-42-paises/</loc><lastmod>2026-02-25T19:29:01+00:00</lastmod></url><url><loc>https://cyberdefensa.mx/dell-recoverpoint-para-vm-zero-day-cve-2026-22769-explotado-desde-mediados-de-2024/</loc><lastmod>2026-02-25T20:30:02+00:00</lastmod></url><url><loc>https://cyberdefensa.mx/tres-formas-de-iniciar-su-programa-de-flujo-de-trabajo-inteligente/</loc><lastmod>2026-02-25T21:31:02+00:00</lastmod></url><url><loc>https://cyberdefensa.mx/notepad-corrige-el-mecanismo-de-actualizacion-secuestrado-utilizado-para-entregar-malware-dirigido/</loc><lastmod>2026-02-25T22:34:28+00:00</lastmod></url><url><loc>https://cyberdefensa.mx/cisa-senala-cuatro-fallas-de-seguridad-bajo-explotacion-activa-en-la-ultima-actualizacion-de-kev/</loc><lastmod>2026-02-25T23:36:22+00:00</lastmod></url><url><loc>https://cyberdefensa.mx/como-los-equipos-soc-modernos-utilizan-la-ia-y-el-contexto-para-investigar-las-infracciones-de-la-nube-mas-rapidamente/</loc><lastmod>2026-02-26T00:39:44+00:00</lastmod></url><url><loc>https://cyberdefensa.mx/los-investigadores-muestran-que-se-puede-abusar-de-copilot-y-grok-como-servidores-proxy-c2-de-malware/</loc><lastmod>2026-02-26T01:40:42+00:00</lastmod></url><url><loc>https://cyberdefensa.mx/la-puerta-trasera-del-firmware-de-keenadu-infecta-tabletas-android-a-traves-de-actualizaciones-ota-firmadas/</loc><lastmod>2026-02-26T02:42:50+00:00</lastmod></url><url><loc>https://cyberdefensa.mx/cisco-sd-wan-zero-day-cve-2026-20127-explotado-desde-2023-para-acceso-de-administrador/</loc><lastmod>2026-02-26T07:18:39+00:00</lastmod></url><url><loc>https://cyberdefensa.mx/microsoft-advierte-a-los-desarrolladores-sobre-repositorios-de-trabajos-falsos-de-next-js-que-entregan-malware-en-la-memoria/</loc><lastmod>2026-02-26T11:49:02+00:00</lastmod></url><url><loc>https://cyberdefensa.mx/el-paquete-malicioso-stripeapi-nuget-imito-la-biblioteca-oficial-y-robo-tokens-api/</loc><lastmod>2026-02-26T12:50:01+00:00</lastmod></url><url><loc>https://cyberdefensa.mx/recomendaciones-de-expertos-preparese-para-pqc-ahora-mismo/</loc><lastmod>2026-02-26T13:51:01+00:00</lastmod></url><url><loc>https://cyberdefensa.mx/uat-10027-apunta-a-la-educacion-y-la-atencion-medica-de-ee-uu-con-la-puerta-trasera-dohdoor/</loc><lastmod>2026-02-26T16:54:13+00:00</lastmod></url><url><loc>https://cyberdefensa.mx/kali-linux-claude-chrome-crash-traps-winrar-flaws-lockbit-15-stories/</loc><lastmod>2026-02-26T18:05:26+00:00</lastmod></url><url><loc>https://cyberdefensa.mx/la-botnet-aeternum-c2-almacena-comandos-cifrados-en-polygon-blockchain-para-evadir-el-ataque/</loc><lastmod>2026-02-26T23:10:02+00:00</lastmod></url><url><loc>https://cyberdefensa.mx/meta-presenta-demandas-contra-anunciantes-de-brasil-china-y-vietnam-por-estafas-con-cebos-para-celebridades/</loc><lastmod>2026-02-27T08:40:01+00:00</lastmod></url><url><loc>https://cyberdefensa.mx/las-herramientas-de-juegos-troyanizadas-difunden-rat-basado-en-java-a-traves-de-navegadores-y-plataformas-de-chat/</loc><lastmod>2026-02-27T10:45:26+00:00</lastmod></url><url><loc>https://cyberdefensa.mx/scarcruft-utiliza-zoho-workdrive-y-malware-usb-para-violar-redes-aisladas/</loc><lastmod>2026-02-27T13:59:18+00:00</lastmod></url><url><loc>https://cyberdefensa.mx/el-modulo-malicioso-go-crypto-roba-contrasenas-e-implementa-una-puerta-trasera-de-rekoobe/</loc><lastmod>2026-02-27T17:14:02+00:00</lastmod></url><url><loc>https://cyberdefensa.mx/mas-de-900-instancias-de-sangoma-freepbx-comprometidas-en-continuos-ataques-de-web-shell/</loc><lastmod>2026-02-27T18:18:50+00:00</lastmod></url><url><loc>https://cyberdefensa.mx/el-departamento-de-justicia-incauta-61-millones-de-dolares-en-tether-vinculado-a-estafas-criptograficas-de-matanza-de-cerdos/</loc><lastmod>2026-02-27T20:21:02+00:00</lastmod></url><url><loc>https://cyberdefensa.mx/el-pentagono-senala-riesgo-antropico-en-la-cadena-de-suministro-por-disputa-militar-sobre-ia/</loc><lastmod>2026-02-28T07:03:53+00:00</lastmod></url><url><loc>https://cyberdefensa.mx/miles-de-claves-api-publicas-de-google-cloud-expuestas-con-gemini-access-despues-de-la-habilitacion-de-api/</loc><lastmod>2026-02-28T10:35:47+00:00</lastmod></url><url><loc>https://cyberdefensa.mx/la-falla-de-clawjacked-permite-a-sitios-maliciosos-secuestrar-agentes-locales-de-ia-de-openclaw-a-traves-de-websocket/</loc><lastmod>2026-02-28T18:24:03+00:00</lastmod></url><url><loc>https://cyberdefensa.mx/hackers-norcoreanos-publican-paquetes-de-26-npm-que-ocultan-pastebin-c2-para-rat-multiplataforma/</loc><lastmod>2026-03-02T09:55:01+00:00</lastmod></url><url><loc>https://cyberdefensa.mx/apt28-vinculado-a-cve-2026-21513-mshtml-de-dia-0-explotado-antes-del-parche-del-martes-de-febrero-de-2026/</loc><lastmod>2026-03-02T12:01:16+00:00</lastmod></url><url><loc>https://cyberdefensa.mx/como-proteger-su-saas-de-ataques-de-bots-con-safeline-waf/</loc><lastmod>2026-03-02T13:02:11+00:00</lastmod></url><url><loc>https://cyberdefensa.mx/sd-wan-0-day-critical-cves-telegram-probe-smart-tv-proxy-sdk-and-more/</loc><lastmod>2026-03-02T14:13:55+00:00</lastmod></url><url><loc>https://cyberdefensa.mx/la-nueva-vulnerabilidad-de-chrome-permite-que-las-extensiones-maliciosas-aumenten-los-privilegios-a-traves-del-panel-gemini/</loc><lastmod>2026-03-02T18:18:01+00:00</lastmod></url><url><loc>https://cyberdefensa.mx/google-desarrolla-certificados-merkle-tree-para-habilitar-https-resistente-a-quantum-en-chrome/</loc><lastmod>2026-03-02T19:19:02+00:00</lastmod></url><url><loc>https://cyberdefensa.mx/google-confirma-cve-2026-21385-en-componente-qualcomm-android-explotado/</loc><lastmod>2026-03-03T09:04:01+00:00</lastmod></url><url><loc>https://cyberdefensa.mx/sloppylemming-ataca-a-los-gobiernos-de-pakistan-y-bangladesh-utilizando-cadenas-duales-de-malware/</loc><lastmod>2026-03-03T10:24:47+00:00</lastmod></url><url><loc>https://cyberdefensa.mx/microsoft-advierte-que-el-abuso-de-redireccionamiento-de-oauth-entrega-malware-a-objetivos-gubernamentales/</loc><lastmod>2026-03-03T11:28:16+00:00</lastmod></url><url><loc>https://cyberdefensa.mx/agentes-de-ia-la-materia-oscura-de-identidad-de-la-proxima-ola/</loc><lastmod>2026-03-03T12:29:40+00:00</lastmod></url><url><loc>https://cyberdefensa.mx/starkiller-phishing-suite-utiliza-el-proxy-inverso-aitm-para-evitar-la-autenticacion-multifactor/</loc><lastmod>2026-03-03T13:32:20+00:00</lastmod></url><url><loc>https://cyberdefensa.mx/the-3-steps-cisos-must-follow/</loc><lastmod>2026-03-03T15:42:29+00:00</lastmod></url><url><loc>https://cyberdefensa.mx/cyberstrikeai-de-codigo-abierto-implementado-en-ataques-fortigate-impulsados-por-ia-en-55-paises/</loc><lastmod>2026-03-03T16:49:49+00:00</lastmod></url><url><loc>https://cyberdefensa.mx/el-spam-de-soporte-tecnico-falso-implementa-havoc-c2-personalizado-en-todas-las-organizaciones/</loc><lastmod>2026-03-03T18:57:48+00:00</lastmod></url><url><loc>https://cyberdefensa.mx/cisa-agrega-el-defecto-de-operaciones-cve-2026-22719-de-vmware-aria-activamente-explotado-al-catalogo-kev/</loc><lastmod>2026-03-04T06:55:12+00:00</lastmod></url><url><loc>https://cyberdefensa.mx/silver-dragon-vinculado-a-apt41-apunta-a-gobiernos-que-utilizan-cobalt-strike-y-google-drive-c2/</loc><lastmod>2026-03-04T08:57:19+00:00</lastmod></url><url><loc>https://cyberdefensa.mx/paquetes-falsos-de-laravel-en-packagist-implementan-rat-en-windows-macos-y-linux/</loc><lastmod>2026-03-04T10:09:46+00:00</lastmod></url><url><loc>https://cyberdefensa.mx/nueva-plantilla-rfp-para-el-control-del-uso-y-la-gobernanza-de-la-ia/</loc><lastmod>2026-03-04T13:21:39+00:00</lastmod></url><url><loc>https://cyberdefensa.mx/el-kit-de-explotacion-de-ios-de-coruna-utiliza-23-explotaciones-en-cinco-cadenas-dirigidas-a-ios-13-17-2-1/</loc><lastmod>2026-03-04T14:23:26+00:00</lastmod></url><url><loc>https://cyberdefensa.mx/149-ataques-hacktivistas-ddos-afectaron-a-110-organizaciones-en-16-paises-despues-del-conflicto-en-medio-oriente/</loc><lastmod>2026-03-04T18:29:13+00:00</lastmod></url><url><loc>https://cyberdefensa.mx/la-operacion-dirigida-por-europol-acaba-con-el-phishing-como-servicio-del-magnate-2fa-vinculado-a-64-000-ataques/</loc><lastmod>2026-03-05T08:05:21+00:00</lastmod></url><url><loc>https://cyberdefensa.mx/el-fbi-y-la-europol-aprovechan-el-foro-leakbase-utilizado-para-intercambiar-credenciales-robadas/</loc><lastmod>2026-03-05T09:11:11+00:00</lastmod></url><url><loc>https://cyberdefensa.mx/donde-termina-la-autenticacion-multifactor-y-comienza-el-abuso-de-credenciales/</loc><lastmod>2026-03-05T11:20:21+00:00</lastmod></url><url><loc>https://cyberdefensa.mx/dust-spectre-apunta-a-funcionarios-iraquies-con-el-nuevo-malware-splitdrop-y-ghostform/</loc><lastmod>2026-03-05T12:21:19+00:00</lastmod></url><url><loc>https://cyberdefensa.mx/la-campana-vinculada-a-apt28-implementa-badpaw-loader-y-meowmeow-backdoor-en-ucrania/</loc><lastmod>2026-03-05T13:27:43+00:00</lastmod></url><url><loc>https://cyberdefensa.mx/ddr5-bot-scalping-samsung-tv-tracking-reddit-privacy-fine-more/</loc><lastmod>2026-03-05T14:29:16+00:00</lastmod></url><url><loc>https://cyberdefensa.mx/seminario-web-poscriptografia-cuantica-para-lideres-de-seguridad/</loc><lastmod>2026-03-05T15:32:37+00:00</lastmod></url><url><loc>https://cyberdefensa.mx/cisco-confirma-la-explotacion-activa-de-dos-vulnerabilidades-de-catalyst-sd-wan-manager/</loc><lastmod>2026-03-05T16:33:15+00:00</lastmod></url><url><loc>https://cyberdefensa.mx/microsoft-revela-la-campana-clickfix-que-utiliza-la-terminal-de-windows-para-implementar-lumma-stealer/</loc><lastmod>2026-03-06T08:53:56+00:00</lastmod></url><url><loc>https://cyberdefensa.mx/los-piratas-informaticos-vinculados-a-china-utilizan-terndoor-peertime-y-bruteentry-en-ataques-de-telecomunicaciones-en-america-del-sur/</loc><lastmod>2026-03-06T09:57:20+00:00</lastmod></url><url><loc>https://cyberdefensa.mx/la-guia-de-msp-para-utilizar-la-gestion-de-riesgos-basada-en-ia-para-escalar-la-ciberseguridad/</loc><lastmod>2026-03-06T11:04:25+00:00</lastmod></url><url><loc>https://cyberdefensa.mx/los-piratas-informaticos-de-muddywater-vinculados-a-iran-atacan-las-redes-estadounidenses-con-una-nueva-puerta-trasera-dindoor/</loc><lastmod>2026-03-06T12:06:09+00:00</lastmod></url><url><loc>https://cyberdefensa.mx/se-agregaron-fallas-de-hikvision-y-rockwell-automation-cvss-9-8-al-catalogo-cisa-kev/</loc><lastmod>2026-03-06T13:19:09+00:00</lastmod></url><url><loc>https://cyberdefensa.mx/transparent-tribe-utiliza-ia-para-producir-en-masa-implantes-de-malware-en-una-campana-dirigida-a-la-india/</loc><lastmod>2026-03-06T15:30:08+00:00</lastmod></url><url><loc>https://cyberdefensa.mx/malware-voidgeist-de-multiples-etapas-que-entrega-xworm-asyncrat-y-xeno-rat/</loc><lastmod>2026-03-06T16:31:53+00:00</lastmod></url><url><loc>https://cyberdefensa.mx/anthropic-encuentra-22-vulnerabilidades-en-firefox-utilizando-el-modelo-de-ia-claude-opus-4-6/</loc><lastmod>2026-03-07T13:01:03+00:00</lastmod></url><url><loc>https://cyberdefensa.mx/openai-codex-security-escaneo-12-millones-de-confirmaciones-y-encontro-10-561-problemas-de-alta-gravedad/</loc><lastmod>2026-03-07T18:30:32+00:00</lastmod></url><url><loc>https://cyberdefensa.mx/explotaciones-de-servidores-web-y-mimikatz-utilizados-en-ataques-dirigidos-a-infraestructura-critica-asiatica/</loc><lastmod>2026-03-09T08:37:01+00:00</lastmod></url><url><loc>https://cyberdefensa.mx/la-extension-de-chrome-se-vuelve-maliciosa-despues-de-la-transferencia-de-propiedad-lo-que-permite-la-inyeccion-de-codigo-y-el-robo-de-datos/</loc><lastmod>2026-03-09T11:03:35+00:00</lastmod></url><url><loc>https://cyberdefensa.mx/puede-finalmente-la-plataforma-de-seguridad-ofrecer-resultados-para-el-mercado-medio/</loc><lastmod>2026-03-09T12:09:04+00:00</lastmod></url><url><loc>https://cyberdefensa.mx/qualcomm-0-day-ios-exploit-chains-airsnitch-attack-vibe-coded-malware/</loc><lastmod>2026-03-09T15:43:26+00:00</lastmod></url><url><loc>https://cyberdefensa.mx/unc4899-infringio-una-empresa-de-cifrado-despues-de-que-un-desarrollador-lanzara-por-aire-un-archivo-troyanizado-al-dispositivo-de-trabajo/</loc><lastmod>2026-03-09T16:44:08+00:00</lastmod></url><url><loc>https://cyberdefensa.mx/el-paquete-npm-malicioso-que-se-hace-pasar-por-el-instalador-de-openclaw-implementa-rat-y-roba-credenciales-de-macos/</loc><lastmod>2026-03-09T18:50:22+00:00</lastmod></url><url><loc>https://cyberdefensa.mx/los-actores-de-amenazas-escanean-masivamente-salesforce-experience-cloud-mediante-la-herramienta-aurainspector-modificada/</loc><lastmod>2026-03-10T08:18:13+00:00</lastmod></url><url><loc>https://cyberdefensa.mx/cisa-senala-las-vulnerabilidades-de-solarwinds-ivanti-y-workspace-one-como-explotadas-activamente/</loc><lastmod>2026-03-10T09:27:02+00:00</lastmod></url><url><loc>https://cyberdefensa.mx/una-guia-de-seminarios-web-para-auditar-flujos-de-trabajo-agentes-modernos/</loc><lastmod>2026-03-10T12:34:52+00:00</lastmod></url><url><loc>https://cyberdefensa.mx/las-nuevas-fallas-de-leakylooker-en-google-looker-studio-podrian-permitir-consultas-sql-entre-inquilinos/</loc><lastmod>2026-03-10T13:37:02+00:00</lastmod></url><url><loc>https://cyberdefensa.mx/una-guia-para-la-reduccion-de-la-superficie-de-ataque/</loc><lastmod>2026-03-10T14:38:23+00:00</lastmod></url><url><loc>https://cyberdefensa.mx/apt28-utiliza-el-malware-beardshell-y-covenant-para-espiar-al-ejercito-ucraniano/</loc><lastmod>2026-03-10T15:39:17+00:00</lastmod></url><url><loc>https://cyberdefensa.mx/el-malware-kadnap-infecta-mas-de-14-000-dispositivos-perimetrales-para-impulsar-la-botnet-proxy-sigilosa/</loc><lastmod>2026-03-10T16:40:50+00:00</lastmod></url><url><loc>https://cyberdefensa.mx/dispositivos-fortigate-explotados-para-violar-redes-y-robar-credenciales-de-cuentas-de-servicio/</loc><lastmod>2026-03-10T17:42:35+00:00</lastmod></url><url><loc>https://cyberdefensa.mx/cinco-cajas-de-oxido-maliciosas-y-un-robot-de-inteligencia-artificial-explotan-las-canalizaciones-de-ci-cd-para-robar-secretos-de-los-desarrolladores/</loc><lastmod>2026-03-11T06:05:27+00:00</lastmod></url><url><loc>https://cyberdefensa.mx/unc6426-aprovecha-el-ataque-a-la-cadena-de-suministro-de-nx-npm-para-obtener-acceso-de-administrador-de-aws-en-72-horas/</loc><lastmod>2026-03-11T09:12:51+00:00</lastmod></url><url><loc>https://cyberdefensa.mx/microsoft-corrige-84-fallas-el-martes-de-parches-de-marzo-incluidos-dos-dias-cero-publicos/</loc><lastmod>2026-03-11T10:16:15+00:00</lastmod></url><url><loc>https://cyberdefensa.mx/meta-desactiva-150-000-cuentas-vinculadas-a-centros-de-estafa-del-sudeste-asiatico-en-una-ofensiva-global/</loc><lastmod>2026-03-11T13:24:00+00:00</lastmod></url><url><loc>https://cyberdefensa.mx/docenas-de-proveedores-parchean-fallas-de-seguridad-en-software-empresarial-y-dispositivos-de-red/</loc><lastmod>2026-03-11T14:25:08+00:00</lastmod></url><url><loc>https://cyberdefensa.mx/defectos-criticos-de-n8n-permiten-la-ejecucion-remota-de-codigo-y-la-exposicion-de-credenciales-almacenadas/</loc><lastmod>2026-03-11T15:26:11+00:00</lastmod></url><url><loc>https://cyberdefensa.mx/lo-que-las-juntas-directivas-deben-exigir-en-la-era-de-la-explotacion-automatizada-por-la-ia/</loc><lastmod>2026-03-11T16:26:55+00:00</lastmod></url><url><loc>https://cyberdefensa.mx/los-investigadores-enganan-al-navegador-comet-ai-de-perplexity-para-convertirlo-en-una-estafa-de-phishing-en-menos-de-cuatro-minutos/</loc><lastmod>2026-03-11T18:30:28+00:00</lastmod></url><url><loc>https://cyberdefensa.mx/cisa-senala-un-error-n8n-rce-explotado-activamente-mientras-24-700-instancias-permanecen-expuestas/</loc><lastmod>2026-03-12T05:52:01+00:00</lastmod></url><url><loc>https://cyberdefensa.mx/seis-familias-de-malware-para-android-apuntan-a-pagos-pix-aplicaciones-bancarias-y-carteras-criptograficas/</loc><lastmod>2026-03-12T09:27:06+00:00</lastmod></url><url><loc>https://cyberdefensa.mx/apple-publica-actualizaciones-de-seguridad-para-dispositivos-ios-mas-antiguos-atacados-por-el-exploit-coruna-webkit/</loc><lastmod>2026-03-12T11:29:01+00:00</lastmod></url><url><loc>https://cyberdefensa.mx/attackers-dont-just-send-phishing-emails-they-weaponize-your-socs-workload/</loc><lastmod>2026-03-12T12:31:49+00:00</lastmod></url><url><loc>https://cyberdefensa.mx/how-to-scale-phishing-detection-in-your-soc-3-steps-for-cisos/</loc><lastmod>2026-03-12T15:18:11+00:00</lastmod></url><url><loc>https://cyberdefensa.mx/oauth-trap-edr-killer-signal-phishing-zombie-zip-ai-platform-hack-more/</loc><lastmod>2026-03-12T16:23:02+00:00</lastmod></url><url><loc>https://cyberdefensa.mx/el-malware-venon-basado-en-rust-se-dirige-a-33-bancos-brasilenos-con-superposiciones-de-robo-de-credenciales/</loc><lastmod>2026-03-12T18:34:04+00:00</lastmod></url><url><loc>https://cyberdefensa.mx/hive0163-utiliza-malware-slopoly-asistido-por-ia-para-acceso-persistente-en-ataques-de-ransomware/</loc><lastmod>2026-03-12T19:37:47+00:00</lastmod></url><url><loc>https://cyberdefensa.mx/veeam-parchea-7-fallos-criticos-de-copia-de-seguridad-y-replicacion-que-permiten-la-ejecucion-remota-de-codigo/</loc><lastmod>2026-03-13T06:09:17+00:00</lastmod></url><url><loc>https://cyberdefensa.mx/las-autoridades-interrumpen-la-botnet-proxy-socksescort-que-explota-369-000-ip-en-163-paises/</loc><lastmod>2026-03-13T07:12:48+00:00</lastmod></url><url><loc>https://cyberdefensa.mx/google-corrige-dos-chrome-zero-day-explotados-en-estado-salvaje-que-afectan-a-skia-y-v8/</loc><lastmod>2026-03-13T10:16:01+00:00</lastmod></url><url><loc>https://cyberdefensa.mx/nueve-fallas-de-crackarmor-en-linux-apparmor-permiten-la-escalada-de-raiz-y-evitan-el-aislamiento-de-contenedores/</loc><lastmod>2026-03-13T11:21:20+00:00</lastmod></url><url><loc>https://cyberdefensa.mx/investigando-una-nueva-variante-de-click-fix/</loc><lastmod>2026-03-13T14:26:59+00:00</lastmod></url><url><loc>https://cyberdefensa.mx/storm-2561-propaga-clientes-vpn-troyanos-mediante-envenenamiento-de-seo-para-robar-credenciales/</loc><lastmod>2026-03-13T15:28:23+00:00</lastmod></url><url><loc>https://cyberdefensa.mx/interpol-desmantela-45-000-ip-maliciosas-y-detiene-a-94-por-ciberdelincuencia-mundial/</loc><lastmod>2026-03-13T16:30:09+00:00</lastmod></url><url><loc>https://cyberdefensa.mx/los-piratas-informaticos-chinos-atacan-a-los-militares-del-sudeste-asiatico-con-el-malware-applechris-y-memfun/</loc><lastmod>2026-03-13T18:33:57+00:00</lastmod></url><url><loc>https://cyberdefensa.mx/meta-cerrara-el-soporte-de-chat-cifrado-de-extremo-a-extremo-de-instagram-a-partir-de-mayo-de-2026/</loc><lastmod>2026-03-13T19:36:50+00:00</lastmod></url><url><loc>https://cyberdefensa.mx/el-ataque-a-la-cadena-de-suministro-glassworm-abusa-de-72-extensiones-vsx-abiertas-para-apuntar-a-los-desarrolladores/</loc><lastmod>2026-03-14T14:27:41+00:00</lastmod></url><url><loc>https://cyberdefensa.mx/las-fallas-del-agente-openclaw-ai-podrian-permitir-una-inyeccion-rapida-y-una-filtracion-de-datos/</loc><lastmod>2026-03-14T17:32:33+00:00</lastmod></url><url><loc>https://cyberdefensa.mx/android-17-bloquea-aplicaciones-que-no-son-de-accesibilidad-de-la-api-de-accesibilidad-para-evitar-el-abuso-de-malware/</loc><lastmod>2026-03-16T06:57:53+00:00</lastmod></url><url><loc>https://cyberdefensa.mx/drillapp-backdoor-apunta-a-ucrania-y-abusa-de-la-depuracion-de-microsoft-edge-para-espionaje-sigiloso/</loc><lastmod>2026-03-16T11:02:05+00:00</lastmod></url><url><loc>https://cyberdefensa.mx/por-que-la-validacion-de-seguridad-se-esta-volviendo-agente/</loc><lastmod>2026-03-16T13:05:01+00:00</lastmod></url><url><loc>https://cyberdefensa.mx/las-campanas-de-clickfix-difunden-macsync-macos-infostealer-a-traves-de-instaladores-falsos-de-herramientas-de-inteligencia-artificial/</loc><lastmod>2026-03-16T14:06:30+00:00</lastmod></url><url><loc>https://cyberdefensa.mx/chrome-0-days-router-botnets-aws-breach-rogue-ai-agents-more/</loc><lastmod>2026-03-16T16:11:25+00:00</lastmod></url><url><loc>https://cyberdefensa.mx/el-ataque-glassworm-utiliza-tokens-de-github-robados-para-forzar-el-envio-de-malware-a-repositorios-de-python/</loc><lastmod>2026-03-16T20:17:17+00:00</lastmod></url><url><loc>https://cyberdefensa.mx/cisa-senala-rutas-de-servidor-con-fugas-de-vulnerabilidad-wing-ftp-activamente-explotada/</loc><lastmod>2026-03-17T06:02:13+00:00</lastmod></url><url><loc>https://cyberdefensa.mx/konni-implementa-endrat-mediante-phishing-y-utiliza-kakaotalk-para-propagar-malware/</loc><lastmod>2026-03-17T11:19:03+00:00</lastmod></url><url><loc>https://cyberdefensa.mx/la-ia-esta-en-todas-partes-pero-los-ciso-aun-la-protegen-con-las-habilidades-y-herramientas-del-pasado-segun-un-estudio/</loc><lastmod>2026-03-17T12:31:52+00:00</lastmod></url><url><loc>https://cyberdefensa.mx/leaknet-ransomware-utiliza-clickfix-a-traves-de-sitios-pirateados-e-implementa-deno-in-memory-loader/</loc><lastmod>2026-03-17T15:45:55+00:00</lastmod></url><url><loc>https://cyberdefensa.mx/los-fallos-de-la-ia-en-amazon-bedrock-langsmith-y-sglang-permiten-la-filtracion-de-datos-y-el-rce/</loc><lastmod>2026-03-17T18:01:10+00:00</lastmod></url><url><loc>https://cyberdefensa.mx/fallo-critico-de-telnetd-sin-parches-cve-2026-32746-permite-rce-raiz-no-autenticado-a-traves-del-puerto-23/</loc><lastmod>2026-03-18T06:28:38+00:00</lastmod></url><url><loc>https://cyberdefensa.mx/apple-corrige-la-vulnerabilidad-de-webkit-permitiendo-omitir-la-politica-del-mismo-origen-en-ios-y-macos/</loc><lastmod>2026-03-18T07:30:30+00:00</lastmod></url><url><loc>https://cyberdefensa.mx/el-error-cve-2026-3888-de-ubuntu-permite-a-los-atacantes-obtener-raiz-a-traves-del-exploit-de-sincronizacion-de-limpieza-systemd/</loc><lastmod>2026-03-18T09:34:28+00:00</lastmod></url><url><loc>https://cyberdefensa.mx/como-mesh-csma-revela-y-rompe-rutas-de-ataque-hacia-las-joyas-de-la-corona/</loc><lastmod>2026-03-18T11:42:58+00:00</lastmod></url><url><loc>https://cyberdefensa.mx/obtener-el-modelo-de-amenaza-correcto/</loc><lastmod>2026-03-18T12:44:24+00:00</lastmod></url><url><loc>https://cyberdefensa.mx/nueve-fallas-criticas-de-kvm-ip-permiten-acceso-raiz-no-autenticado-a-traves-de-cuatro-proveedores/</loc><lastmod>2026-03-18T13:49:01+00:00</lastmod></url><url><loc>https://cyberdefensa.mx/interlock-ransomware-explota-cisco-fmc-zero-day-cve-2026-20131-para-acceso-raiz/</loc><lastmod>2026-03-18T16:57:22+00:00</lastmod></url><url><loc>https://cyberdefensa.mx/la-ofac-sanciona-a-la-red-de-trabajadores-de-ti-de-la-rpdc-que-financia-programas-de-armas-de-destruccion-masiva-mediante-trabajos-remotos-falsos/</loc><lastmod>2026-03-18T18:00:34+00:00</lastmod></url><url><loc>https://cyberdefensa.mx/cisa-advierte-sobre-zimbra-y-vulnerabilidades-de-sharepoint-cisco-zero-day-afectado-por-ataques-de-ransomware/</loc><lastmod>2026-03-19T07:36:50+00:00</lastmod></url><url><loc>https://cyberdefensa.mx/el-kit-de-explotacion-darksword-ios-utiliza-6-fallas-y-3-dias-cero-para-la-adquisicion-total-del-dispositivo/</loc><lastmod>2026-03-19T10:43:28+00:00</lastmod></url><url><loc>https://cyberdefensa.mx/como-ceros-brinda-visibilidad-y-control-a-los-equipos-de-seguridad-en-claude-code/</loc><lastmod>2026-03-19T11:45:25+00:00</lastmod></url><url><loc>https://cyberdefensa.mx/el-nuevo-malware-bancario-perseus-para-android-monitorea-las-aplicaciones-de-notas-para-extraer-datos-confidenciales/</loc><lastmod>2026-03-19T13:50:57+00:00</lastmod></url><url><loc>https://cyberdefensa.mx/fortigate-raas-citrix-exploits-mcp-abuse-livechat-phish-more/</loc><lastmod>2026-03-19T14:52:10+00:00</lastmod></url><url><loc>https://cyberdefensa.mx/54-asesinos-de-edr-utilizan-byovd-para-explotar-34-controladores-vulnerables-firmados-y-desactivar-la-seguridad/</loc><lastmod>2026-03-19T19:27:00+00:00</lastmod></url><url><loc>https://cyberdefensa.mx/speagle-malware-secuestra-cobra-docguard-para-robar-datos-a-traves-de-servidores-comprometidos/</loc><lastmod>2026-03-19T21:30:17+00:00</lastmod></url><url><loc>https://cyberdefensa.mx/apple-advierte-que-los-iphone-mas-antiguos-son-vulnerables-a-los-ataques-del-kit-de-explotacion-darksword-y-coruna/</loc><lastmod>2026-03-20T06:13:11+00:00</lastmod></url><url><loc>https://cyberdefensa.mx/el-departamento-de-justicia-interrumpe-3-millones-de-botnets-de-iot-de-dispositivos-detras-de-ataques-ddos-globales-record-de-314-tbps/</loc><lastmod>2026-03-20T07:14:00+00:00</lastmod></url><url><loc>https://cyberdefensa.mx/google-agrega-una-espera-de-24-horas-para-la-descarga-de-aplicaciones-no-verificadas-para-reducir-el-malware-y-las-estafas/</loc><lastmod>2026-03-20T11:29:20+00:00</lastmod></url><url><loc>https://cyberdefensa.mx/la-importancia-del-analisis-del-comportamiento-en-los-ciberataques-basados-en-ia/</loc><lastmod>2026-03-20T12:33:12+00:00</lastmod></url><url><loc>https://cyberdefensa.mx/la-falla-de-magento-polyshell-permite-cargas-no-autenticadas-rce-y-apropiacion-de-cuentas/</loc><lastmod>2026-03-20T13:36:49+00:00</lastmod></url><url><loc>https://cyberdefensa.mx/la-falla-critica-de-langflow-cve-2026-33017-desencadena-ataques-dentro-de-las-20-horas-posteriores-a-la-divulgacion/</loc><lastmod>2026-03-20T16:49:05+00:00</lastmod></url><url><loc>https://cyberdefensa.mx/acciones-de-github-de-trivy-security-scanner-violadas-75-etiquetas-secuestradas-para-robar-secretos-de-ci-cd/</loc><lastmod>2026-03-20T18:51:20+00:00</lastmod></url><url><loc>https://cyberdefensa.mx/el-ataque-de-trivy-a-la-cadena-de-suministro-desencadena-un-gusano-bote-que-se-propaga-automaticamente-en-paquetes-de-47-npm/</loc><lastmod>2026-03-21T08:33:56+00:00</lastmod></url><url><loc>https://cyberdefensa.mx/cisa-senala-errores-de-apple-craft-cms-y-laravel-en-kev-y-solicita-parches-antes-del-3-de-abril-de-2026/</loc><lastmod>2026-03-21T09:40:02+00:00</lastmod></url><url><loc>https://cyberdefensa.mx/oracle-parchea-el-cve-2026-21992-critico-que-habilita-rce-no-autenticado-en-identity-manager/</loc><lastmod>2026-03-21T12:03:54+00:00</lastmod></url><url><loc>https://cyberdefensa.mx/el-fbi-advierte-a-los-piratas-informaticos-rusos-que-apuntan-a-signal-y-whatsapp-en-ataques-masivos-de-phishing/</loc><lastmod>2026-03-21T14:10:18+00:00</lastmod></url><url><loc>https://cyberdefensa.mx/los-piratas-informaticos-aprovechan-cve-2025-32975-cvss-10-0-para-secuestrar-sistemas-quest-kace-sma-sin-parches/</loc><lastmod>2026-03-23T07:48:39+00:00</lastmod></url><url><loc>https://cyberdefensa.mx/trivy-hack-difunde-infostealer-a-traves-de-docker-triggers-worm-y-kubernetes-wiper/</loc><lastmod>2026-03-23T09:55:12+00:00</lastmod></url><url><loc>https://cyberdefensa.mx/microsoft-advierte-que-el-phishing-del-irs-afecta-a-29-000-usuarios-e-implementa-malware-rmm/</loc><lastmod>2026-03-23T11:56:46+00:00</lastmod></url><url><loc>https://cyberdefensa.mx/encontramos-ocho-vectores-de-ataque-dentro-de-aws-bedrock-esto-es-lo-que-los-atacantes-pueden-hacer-con-ellos/</loc><lastmod>2026-03-23T14:00:24+00:00</lastmod></url><url><loc>https://cyberdefensa.mx/ci-cd-backdoor-fbi-buys-location-data-whatsapp-ditches-numbers-more/</loc><lastmod>2026-03-23T15:01:03+00:00</lastmod></url><url><loc>https://cyberdefensa.mx/los-piratas-informaticos-norcoreanos-abusan-de-las-tareas-de-ejecucion-automatica-del-codigo-vs-para-implementar-el-malware-stoatwaffle/</loc><lastmod>2026-03-23T20:05:59+00:00</lastmod></url><url><loc>https://cyberdefensa.mx/estados-unidos-condena-a-un-hacker-ruso-a-675-anos-por-su-participacion-en-danos-por-ransomware-de-9-millones-de-dolares/</loc><lastmod>2026-03-24T07:29:44+00:00</lastmod></url><url><loc>https://cyberdefensa.mx/citrix-insta-a-corregir-un-defecto-critico-de-netscaler-que-permite-fugas-de-datos-no-autenticados/</loc><lastmod>2026-03-24T08:30:46+00:00</lastmod></url><url><loc>https://cyberdefensa.mx/el-costo-oculto-de-la-especializacion-en-ciberseguridad-perder-habilidades-fundamentales/</loc><lastmod>2026-03-24T11:33:54+00:00</lastmod></url><url><loc>https://cyberdefensa.mx/la-campana-fantasma-utiliza-paquetes-de-7-npm-para-robar-carteras-y-credenciales-criptograficas/</loc><lastmod>2026-03-24T12:35:52+00:00</lastmod></url><url><loc>https://cyberdefensa.mx/5-learnings-from-the-first-ever-gartner-market-guide-for-guardian-agents/</loc><lastmod>2026-03-24T13:36:26+00:00</lastmod></url><url><loc>https://cyberdefensa.mx/teampcp-piratea-acciones-de-checkmarx-github-utilizando-credenciales-de-ci-robadas/</loc><lastmod>2026-03-24T14:38:44+00:00</lastmod></url><url><loc>https://cyberdefensa.mx/los-piratas-informaticos-utilizan-curriculums-falsos-para-robar-credenciales-empresariales-e-implementar-crypto-miner/</loc><lastmod>2026-03-24T17:45:20+00:00</lastmod></url><url><loc>https://cyberdefensa.mx/los-anuncios-de-busqueda-de-impuestos-generan-malware-screenconnect-utilizando-el-controlador-de-huawei-para-deshabilitar-edr/</loc><lastmod>2026-03-24T18:48:06+00:00</lastmod></url><url><loc>https://cyberdefensa.mx/teampcp-backdoors-litellm-versiones-1-82-7-1-82-8-probablemente-a-traves-del-compromiso-trivy-ci-cd/</loc><lastmod>2026-03-24T19:50:57+00:00</lastmod></url><url><loc>https://cyberdefensa.mx/la-fcc-prohibe-nuevos-enrutadores-fabricados-en-el-extranjero-por-preocupaciones-sobre-la-cadena-de-suministro-y-el-riesgo-cibernetico/</loc><lastmod>2026-03-25T09:03:47+00:00</lastmod></url><url><loc>https://cyberdefensa.mx/la-cadena-de-muerte-queda-obsoleta-cuando-su-agente-de-inteligencia-artificial-es-la-amenaza/</loc><lastmod>2026-03-25T13:11:59+00:00</lastmod></url><url><loc>https://cyberdefensa.mx/hacker-ruso-condenado-a-2-anos-por-ataques-de-ransomware-impulsados-por-la-botnet-ta551/</loc><lastmod>2026-03-25T14:15:18+00:00</lastmod></url><url><loc>https://cyberdefensa.mx/el-malware-glassworm-utiliza-solana-dead-drops-para-entregar-rat-y-robar-datos-criptograficos-y-del-navegador/</loc><lastmod>2026-03-25T15:21:16+00:00</lastmod></url><url><loc>https://cyberdefensa.mx/el-phishing-de-codigos-de-dispositivos-afecta-a-mas-de-340-organizaciones-de-microsoft-365-en-cinco-paises-a-traves-del-abuso-de-oauth/</loc><lastmod>2026-03-25T16:22:14+00:00</lastmod></url><url><loc>https://cyberdefensa.mx/administrador-de-leakbase-arrestado-en-rusia-por-robo-masivo-de-credenciales-en-el-mercado/</loc><lastmod>2026-03-25T17:57:07+00:00</lastmod></url><url><loc>https://cyberdefensa.mx/webrtc-skimmer-omite-el-csp-para-robar-datos-de-pago-de-sitios-de-comercio-electronico/</loc><lastmod>2026-03-26T09:04:36+00:00</lastmod></url><url><loc>https://cyberdefensa.mx/el-kit-coruna-ios-reutiliza-el-codigo-de-explotacion-de-triangulacion-de-2023-en-nuevos-ataques-masivos/</loc><lastmod>2026-03-26T12:18:20+00:00</lastmod></url><url><loc>https://cyberdefensa.mx/webinar-deja-de-adivinar-aprenda-a-validar-sus-defensas-contra-ataques-reales/</loc><lastmod>2026-03-26T13:27:45+00:00</lastmod></url><url><loc>https://cyberdefensa.mx/la-falla-de-la-extension-claude-permitio-la-inyeccion-rapida-de-xss-sin-hacer-clic-a-traves-de-cualquier-sitio-web/</loc><lastmod>2026-03-26T14:29:59+00:00</lastmod></url><url><loc>https://cyberdefensa.mx/como-los-piratas-informaticos-y-los-falsificadores-de-arte-perfeccionan-el-arte-del-engano/</loc><lastmod>2026-03-26T15:32:18+00:00</lastmod></url><url><loc>https://cyberdefensa.mx/pqc-push-ai-vuln-hunting-pirated-traps-phishing-kits-20-more-stories/</loc><lastmod>2026-03-26T16:37:54+00:00</lastmod></url><url><loc>https://cyberdefensa.mx/red-menshen-vinculado-a-china-utiliza-sigilosos-implantes-de-puertas-bpf-para-espiar-a-traves-de-redes-de-telecomunicaciones/</loc><lastmod>2026-03-26T18:51:46+00:00</lastmod></url><url><loc>https://cyberdefensa.mx/los-defectos-de-langchain-y-langgraph-exponen-archivos-secretos-y-bases-de-datos-en-marcos-de-ia-ampliamente-utilizados/</loc><lastmod>2026-03-27T09:23:13+00:00</lastmod></url><url><loc>https://cyberdefensa.mx/bearlyfy-ataca-a-mas-de-70-empresas-rusas-con-el-ransomware-genielocker-personalizado/</loc><lastmod>2026-03-27T10:24:20+00:00</lastmod></url><url><loc>https://cyberdefensa.mx/estamos-en-guerra/</loc><lastmod>2026-03-27T11:25:56+00:00</lastmod></url><url><loc>https://cyberdefensa.mx/el-phishing-de-aitm-se-dirige-a-cuentas-comerciales-de-tiktok-mediante-la-evasion-de-torniquete-de-cloudflare/</loc><lastmod>2026-03-27T13:27:13+00:00</lastmod></url><url><loc>https://cyberdefensa.mx/el-error-abierto-de-vsx-permite-que-las-extensiones-de-codigo-vs-maliciosas-omitan-las-comprobaciones-de-seguridad-previas-a-la-publicacion/</loc><lastmod>2026-03-27T15:31:23+00:00</lastmod></url><url><loc>https://cyberdefensa.mx/teampcp-envia-versiones-maliciosas-de-telnyx-a-pypi-y-oculta-el-ladron-en-archivos-wav/</loc><lastmod>2026-03-27T17:34:33+00:00</lastmod></url><url><loc>https://cyberdefensa.mx/apple-envia-alertas-de-pantalla-de-bloqueo-a-iphones-obsoletos-a-traves-de-exploits-activos-basados-en-la-web/</loc><lastmod>2026-03-27T18:35:29+00:00</lastmod></url><url><loc>https://cyberdefensa.mx/cisa-agrega-cve-2025-53521-a-kev-despues-de-la-explotacion-activa-de-f5-big-ip-apm/</loc><lastmod>2026-03-28T08:11:37+00:00</lastmod></url><url><loc>https://cyberdefensa.mx/ta446-implementa-el-kit-de-explotacion-darksword-para-ios-en-una-campana-de-phishing-dirigida/</loc><lastmod>2026-03-28T09:19:17+00:00</lastmod></url><url><loc>https://cyberdefensa.mx/citrix-netscaler-bajo-active-recon-para-error-de-sobrelectura-de-memoria-cve-2026-3055-cvss-9-3/</loc><lastmod>2026-03-28T10:20:01+00:00</lastmod></url><url><loc>https://cyberdefensa.mx/hackers-vinculados-a-iran-violan-el-correo-electronico-personal-del-director-del-fbi-y-atacan-a-stryker-con-un-limpiaparabrisas/</loc><lastmod>2026-03-28T17:02:04+00:00</lastmod></url><url><loc>https://cyberdefensa.mx/tres-grupos-vinculados-a-china-apuntan-al-gobierno-del-sudeste-asiatico-en-la-campana-cibernetica-2025/</loc><lastmod>2026-03-30T07:45:50+00:00</lastmod></url><url><loc>https://cyberdefensa.mx/el-kit-de-herramientas-ctrl-ruso-entregado-a-traves-de-archivos-lnk-maliciosos-secuestra-rdp-a-traves-de-tuneles-frp/</loc><lastmod>2026-03-30T10:53:23+00:00</lastmod></url><url><loc>https://cyberdefensa.mx/el-estado-de-los-secretos-en-expansion-en-2026-nueve-conclusiones-para-los-ciso/</loc><lastmod>2026-03-30T11:58:52+00:00</lastmod></url><url><loc>https://cyberdefensa.mx/telecom-sleeper-cells-llm-jailbreaks-apple-forces-u-k-age-checks-and-more/</loc><lastmod>2026-03-30T15:05:53+00:00</lastmod></url><url><loc>https://cyberdefensa.mx/tres-soluciones-al-proceso-soc-que-desbloquean-la-productividad-de-nivel-1/</loc><lastmod>2026-03-30T16:06:56+00:00</lastmod></url><url><loc>https://cyberdefensa.mx/el-malware-deepload-utiliza-clickfix-y-la-persistencia-de-wmi-para-robar-credenciales-del-navegador/</loc><lastmod>2026-03-30T17:10:08+00:00</lastmod></url><url><loc>https://cyberdefensa.mx/openai-corrige-la-falla-de-filtracion-de-datos-de-chatgpt-y-la-vulnerabilidad-del-token-codex-github/</loc><lastmod>2026-03-30T20:17:06+00:00</lastmod></url><url><loc>https://cyberdefensa.mx/el-ataque-a-la-cadena-de-suministro-de-axios-impulsa-rat-multiplataforma-a-traves-de-una-cuenta-npm-comprometida/</loc><lastmod>2026-03-31T07:22:48+00:00</lastmod></url><url><loc>https://cyberdefensa.mx/silver-fox-amplia-la-campana-cibernetica-de-asia-con-atlascross-rat-y-dominios-falsos/</loc><lastmod>2026-03-31T13:30:17+00:00</lastmod></url><url><loc>https://cyberdefensa.mx/la-vulnerabilidad-de-vertex-ai-expone-datos-de-google-cloud-y-artefactos-privados/</loc><lastmod>2026-03-31T14:31:43+00:00</lastmod></url><url><loc>https://cyberdefensa.mx/la-carrera-armamentista-de-la-ia-por-que-la-gestion-unificada-de-la-exposicion-se-esta-convirtiendo-en-una-prioridad-en-las-salas-de-juntas/</loc><lastmod>2026-03-31T15:33:19+00:00</lastmod></url><url><loc>https://cyberdefensa.mx/trueconf-zero-day-explotado-en-ataques-a-redes-gubernamentales-del-sudeste-asiatico/</loc><lastmod>2026-03-31T16:34:34+00:00</lastmod></url><url><loc>https://cyberdefensa.mx/la-implementacion-de-la-verificacion-de-desarrolladores-de-android-comienza-antes-de-la-aplicacion-de-la-ley-en-septiembre/</loc><lastmod>2026-03-31T19:39:19+00:00</lastmod></url><url><loc>https://cyberdefensa.mx/la-fuente-del-codigo-claude-se-filtro-a-traves-de-un-error-de-empaquetado-de-npm-confirma-anthropic/</loc><lastmod>2026-04-01T06:55:10+00:00</lastmod></url><url><loc>https://cyberdefensa.mx/google-atribuye-el-ataque-a-la-cadena-de-suministro-de-axios-npm-al-grupo-norcoreano-unc1069/</loc><lastmod>2026-04-01T08:59:09+00:00</lastmod></url><url><loc>https://cyberdefensa.mx/tres-razones-por-las-que-los-atacantes-estan-utilizando-sus-herramientas-confiables-en-su-contra-y-por-que-no-lo-ve-venir/</loc><lastmod>2026-04-01T12:04:34+00:00</lastmod></url><url><loc>https://cyberdefensa.mx/bloquee-el-mensaje-no-el-trabajo-el-fin-de-medico-no/</loc><lastmod>2026-04-01T14:06:25+00:00</lastmod></url><url><loc>https://cyberdefensa.mx/microsoft-advierte-sobre-malware-vbs-entregado-por-whatsapp-que-secuestra-windows-a-traves-de-uac-bypass/</loc><lastmod>2026-04-01T15:06:55+00:00</lastmod></url><url><loc>https://cyberdefensa.mx/el-phishing-de-casbaneiro-se-dirige-a-america-latina-y-europa-utilizando-senuelos-pdf-dinamicos/</loc><lastmod>2026-04-01T16:08:26+00:00</lastmod></url><url><loc>https://cyberdefensa.mx/nuevo-chrome-zero-day-cve-2026-5281-en-explotacion-activa-parche-lanzado/</loc><lastmod>2026-04-01T17:11:01+00:00</lastmod></url><url><loc>https://cyberdefensa.mx/la-campana-de-suplantacion-de-identidad-de-cert-ua-difundio-el-malware-agewheeze-en-1-millon-de-correos-electronicos/</loc><lastmod>2026-04-01T18:14:22+00:00</lastmod></url><url><loc>https://cyberdefensa.mx/apple-amplia-la-actualizacion-de-ios-18-7-7-a-mas-dispositivos-para-bloquear-el-exploit-darksword/</loc><lastmod>2026-04-02T07:40:13+00:00</lastmod></url><url><loc>https://cyberdefensa.mx/whatsapp-alerta-a-200-usuarios-despues-de-que-una-aplicacion-ios-falsa-instalara-software-espia-empresa-italiana-se-enfrenta-a-la-accion/</loc><lastmod>2026-04-02T10:48:34+00:00</lastmod></url><url><loc>https://cyberdefensa.mx/investigadores-descubren-una-operacion-minera-que-utiliza-senuelos-iso-para-difundir-rat-y-criptomineros/</loc><lastmod>2026-04-02T11:50:46+00:00</lastmod></url><url><loc>https://cyberdefensa.mx/the-state-of-trusted-open-source-report/</loc><lastmod>2026-04-02T12:58:59+00:00</lastmod></url><url><loc>https://cyberdefensa.mx/pre-auth-chains-android-rootkits-cloudtrail-evasion-10-more-stories/</loc><lastmod>2026-04-02T14:05:09+00:00</lastmod></url><url><loc>https://cyberdefensa.mx/cisco-parchea-fallas-9-8-cvss-imc-y-ssm-que-permiten-comprometer-el-sistema-remoto/</loc><lastmod>2026-04-02T17:08:23+00:00</lastmod></url><url><loc>https://cyberdefensa.mx/los-piratas-informaticos-aprovechan-cve-2025-55182-para-violar-766-hosts-next-js-y-robar-credenciales/</loc><lastmod>2026-04-02T20:37:58+00:00</lastmod></url><url><loc>https://cyberdefensa.mx/nueva-variante-de-sparkcat-en-ios-y-aplicaciones-de-android-roba-imagenes-de-frases-de-recuperacion-de-crypto-wallet/</loc><lastmod>2026-04-03T10:02:28+00:00</lastmod></url><url><loc>https://cyberdefensa.mx/drift-pierde-285-millones-de-dolares-en-un-ataque-duradero-de-ingenieria-social-vinculado-a-la-rpdc/</loc><lastmod>2026-04-03T11:03:09+00:00</lastmod></url><url><loc>https://cyberdefensa.mx/unc1069-la-ingenieria-social-del-mantenedor-de-axios-provoco-un-ataque-a-la-cadena-de-suministro-de-npm/</loc><lastmod>2026-04-03T13:04:40+00:00</lastmod></url><url><loc>https://cyberdefensa.mx/por-que-el-riesgo-de-terceros-es-la-mayor-brecha-en-la-postura-de-seguridad-de-sus-clientes/</loc><lastmod>2026-04-03T14:06:50+00:00</lastmod></url><url><loc>https://cyberdefensa.mx/microsoft-detalla-shells-web-php-controlados-por-cookies-que-persisten-a-traves-de-cron-en-servidores-linux/</loc><lastmod>2026-04-03T17:13:45+00:00</lastmod></url><url><loc>https://cyberdefensa.mx/ta416-vinculado-a-china-apunta-a-gobiernos-europeos-con-phishing-basado-en-plugx-y-oauth/</loc><lastmod>2026-04-03T18:15:16+00:00</lastmod></url></urlset>
