<?xml version="1.0" encoding="UTF-8"?>
<?xml-stylesheet type="text/xsl" href="https://computings.org/wp-sitemap.xsl" ?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9"><url><loc>https://computings.org/2024/11/25/trilio-for-kubernetes-v5-0-reduces-cloud-costs-and-accelerates-data-recovery-for-virtual-machine-data-protection/</loc><lastmod>2024-11-25T21:12:55+00:00</lastmod></url><url><loc>https://computings.org/2024/11/25/tintri-introduces-advanced-kubernetes-data-management/</loc><lastmod>2024-11-25T21:13:03+00:00</lastmod></url><url><loc>https://computings.org/2024/11/25/cloud-computing-removing-bottlenecks-in-kubernetes-services/</loc><lastmod>2024-11-25T21:13:15+00:00</lastmod></url><url><loc>https://computings.org/2024/11/25/kueue-can-now-schedule-kubernetes-batch-jobs-across-clusters/</loc><lastmod>2024-11-25T21:13:23+00:00</lastmod></url><url><loc>https://computings.org/2024/11/25/critical-kubernetes-vulnerability-let-attackers-execute-arbitrary-commands/</loc><lastmod>2024-11-25T21:13:34+00:00</lastmod></url><url><loc>https://computings.org/2024/11/25/how-hp-achieved-40-improvement-in-kubernetes-node-utilization-on-amazon-eks-using-karpenter/</loc><lastmod>2024-11-25T21:13:47+00:00</lastmod></url><url><loc>https://computings.org/2024/11/25/armo-partners-with-orange-business-for-enhanced-kubernetes-security/</loc><lastmod>2024-11-25T21:14:00+00:00</lastmod></url><url><loc>https://computings.org/2024/11/25/operant-ai-announces-3d-runtime-defense-suite-to-secure-live-ai-workloads/</loc><lastmod>2024-11-25T21:14:12+00:00</lastmod></url><url><loc>https://computings.org/2024/11/25/spectro-cloud-closes-75m-series-c-led-by-growth-equity-at-goldman-sachs-alternatives/</loc><lastmod>2024-11-25T21:14:22+00:00</lastmod></url><url><loc>https://computings.org/2024/11/25/cybersecurity-legislation-driving-sboms/</loc><lastmod>2024-11-25T21:42:04+00:00</lastmod></url><url><loc>https://computings.org/2024/11/25/defensible-security-architecture-and-engineering-designing-and-building-defenses-for-the-future/</loc><lastmod>2024-11-25T21:42:16+00:00</lastmod></url><url><loc>https://computings.org/2024/11/25/top-5-platforms-for-identifying-smart-contract-vulnerabilities/</loc><lastmod>2024-11-25T21:42:33+00:00</lastmod></url><url><loc>https://computings.org/2024/11/25/vulnerabilities-expose-myscada-mypro-systems-to-remote-hacking/</loc><lastmod>2024-11-25T21:42:42+00:00</lastmod></url><url><loc>https://computings.org/2024/11/25/cisa-adds-microsoft-sharepoint-vulnerability-to-the-kev-catalog/</loc><lastmod>2024-11-25T21:42:54+00:00</lastmod></url><url><loc>https://computings.org/2024/11/25/mssp-market-update-googles-ai-boost-identifies-26-new-vulnerabilities-in-open-source-projects/</loc><lastmod>2024-11-25T21:43:02+00:00</lastmod></url><url><loc>https://computings.org/2024/11/25/thn-recap-top-cybersecurity-threats-tools-and-practices-nov-18/</loc><lastmod>2024-11-25T21:43:20+00:00</lastmod></url><url><loc>https://computings.org/2024/11/25/ivanti-social-engineering-hits-warehouse-cybersecurity/</loc><lastmod>2024-11-25T21:43:29+00:00</lastmod></url><url><loc>https://computings.org/2024/11/25/cisas-chemical-ssgs-focus-on-strengthening-cyber-defenses-protecting-from-cyber-threats/</loc><lastmod>2024-11-25T21:43:39+00:00</lastmod></url><url><loc>https://computings.org/2024/11/25/2000-un-patched-palo-alto-firewalls-exploited-via-pan-os-vulnerabilities/</loc><lastmod>2024-11-25T21:43:52+00:00</lastmod></url><url><loc>https://computings.org/2024/11/25/cyber-agencies-reveal-top-15-routinely-exploited-vulnerabilities/</loc><lastmod>2024-11-25T21:44:12+00:00</lastmod></url><url><loc>https://computings.org/2024/11/25/7-zip-rce-vulnerability-let-attackers-execute-remote-code/</loc><lastmod>2024-11-25T21:44:23+00:00</lastmod></url><url><loc>https://computings.org/2024/11/25/critical-7-zip-vulnerability-let-attackers-execute-arbitrary-code/</loc><lastmod>2024-11-25T21:44:36+00:00</lastmod></url><url><loc>https://computings.org/2024/11/25/solution-under-review-the-battle-for-industrial-cybersecurity/</loc><lastmod>2024-11-25T21:44:48+00:00</lastmod></url><url><loc>https://computings.org/2024/11/25/leaky-cybersecurity-holes-put-water-systems-at-risk/</loc><lastmod>2024-11-25T21:44:59+00:00</lastmod></url><url><loc>https://computings.org/2024/11/25/zero-days-top-cybersecurity-agencies-most-exploited-list/</loc><lastmod>2024-11-25T21:45:21+00:00</lastmod></url><url><loc>https://computings.org/2024/11/25/google-confirms-critical-security-flaw-using-ai/</loc><lastmod>2024-11-25T21:45:31+00:00</lastmod></url><url><loc>https://computings.org/2024/11/25/top-12-cyber-security-risk-assessment-tools-for-2025/</loc><lastmod>2024-11-25T21:45:47+00:00</lastmod></url><url><loc>https://computings.org/2024/11/25/federal-probe-finds-vulnerabilities-across-more-than-300-us-water-systems/</loc><lastmod>2024-11-25T21:46:03+00:00</lastmod></url><url><loc>https://computings.org/2024/11/25/experts-warn-of-palo-alto-firewall-exploitation-after-2000-compromises-spotted/</loc><lastmod>2024-11-25T21:46:10+00:00</lastmod></url><url><loc>https://computings.org/2024/11/28/linux-foundation-announces-formation-of-the-jupyter-foundation/</loc><lastmod>2024-11-28T21:43:37+00:00</lastmod></url><url><loc>https://computings.org/2024/11/28/open-cybersecurity-schema-framework-ocsf-joins-the-linux-foundation-to-optimize-critical-security-data/</loc><lastmod>2024-11-28T21:43:47+00:00</lastmod></url><url><loc>https://computings.org/2024/11/28/linux-foundation-announces-formation-of-the-jupyter-foundation-2/</loc><lastmod>2024-11-28T21:43:58+00:00</lastmod></url><url><loc>https://computings.org/2024/11/28/open-cybersecurity-schema-framework-ocsf-joins-the-linux-foundation-to-optimize-critical-security-data-2/</loc><lastmod>2024-11-28T21:44:07+00:00</lastmod></url><url><loc>https://computings.org/2024/11/28/cncf-and-andela-announce-partnership-to-train-20000-african-tech-professionals/</loc><lastmod>2024-11-28T21:44:22+00:00</lastmod></url><url><loc>https://computings.org/2024/11/28/red-hat-joins-the-linux-foundations-margo-initiative-to-deliver-edge-interoperability-for-industrial-automation-ecosystems/</loc><lastmod>2024-11-28T21:44:37+00:00</lastmod></url><url><loc>https://computings.org/2024/11/28/at-kubecon-cncf-ramps-up-its-battle-against-patent-trolls/</loc><lastmod>2024-11-28T21:44:48+00:00</lastmod></url><url><loc>https://computings.org/2024/11/28/red-hat-joins-the-linux-foundations-margo-to-deliver-edge-interoperability-for-industrial-automation-ecosystems/</loc><lastmod>2024-11-28T21:44:57+00:00</lastmod></url><url><loc>https://computings.org/2024/11/28/bsv-joins-linux-foundation-to-advance-open-standards/</loc><lastmod>2024-11-28T21:45:12+00:00</lastmod></url><url><loc>https://computings.org/2024/11/28/linux-foundation-energy-everest-project-joins-task-53-of-the-iea/</loc><lastmod>2024-11-28T21:45:22+00:00</lastmod></url><url><loc>https://computings.org/2024/11/28/mangoboost-and-worldtech-it-join-the-linux-foundations-open-programmable-infrastructure-project/</loc><lastmod>2024-11-28T21:45:31+00:00</lastmod></url><url><loc>https://computings.org/2024/11/28/qanplatform-joins-linux-foundation-and-its-post-quantum-cryptography-alliance/</loc><lastmod>2024-11-28T21:45:41+00:00</lastmod></url><url><loc>https://computings.org/2024/11/28/why-aws-gave-opensearch-to-the-linux-foundation/</loc><lastmod>2024-11-28T21:45:54+00:00</lastmod></url><url><loc>https://computings.org/2024/11/28/aws-transfers-opensearch-to-the-linux-foundation/</loc><lastmod>2024-11-28T21:46:04+00:00</lastmod></url><url><loc>https://computings.org/2024/11/28/free5gc-joins-linux-foundation-to-strengthen-open-source-5g-network-development/</loc><lastmod>2024-11-28T21:46:13+00:00</lastmod></url><url><loc>https://computings.org/2024/11/28/aws-hands-opensearch-to-linux-foundation-is-this-why-elasticsearch-was-made-open-source-again/</loc><lastmod>2024-11-28T21:46:28+00:00</lastmod></url><url><loc>https://computings.org/2024/11/28/linux-foundation-cncf-patently-defend-open-source-software/</loc><lastmod>2024-11-28T21:46:37+00:00</lastmod></url><url><loc>https://computings.org/2024/11/28/linux-foundation-decentralized-trust-aims-for-web3-innovation/</loc><lastmod>2024-11-28T21:46:47+00:00</lastmod></url><url><loc>https://computings.org/2024/11/28/aws-welcomes-the-opensearch-software-foundation/</loc><lastmod>2024-11-28T21:46:56+00:00</lastmod></url><url><loc>https://computings.org/2024/11/28/hedera-becomes-founding-premier-member-of-linux-foundation-decentralized-trust/</loc><lastmod>2024-11-28T21:47:09+00:00</lastmod></url><url><loc>https://computings.org/2024/11/28/aws-brings-opensearch-under-the-linux-foundation-umbrella/</loc><lastmod>2024-11-28T21:47:18+00:00</lastmod></url><url><loc>https://computings.org/2024/11/28/big-data-on-kubernetes-worth-31-99-free-ebook-download/</loc><lastmod>2024-11-28T21:47:29+00:00</lastmod></url><url><loc>https://computings.org/2024/11/28/top-kubernetes-commands-every-devops-engineer-should-know/</loc><lastmod>2024-11-28T21:47:54+00:00</lastmod></url><url><loc>https://computings.org/2024/11/28/kubernetes-ai-deployment-simplified/</loc><lastmod>2024-11-28T21:48:09+00:00</lastmod></url><url><loc>https://computings.org/2024/11/28/kubernetes-skills-andelas-impact-on-african-tech-talent/</loc><lastmod>2024-11-28T21:48:20+00:00</lastmod></url><url><loc>https://computings.org/2024/11/28/grafana-labs-extends-observability-deeper-into-kubernetes-environments/</loc><lastmod>2024-11-28T21:48:45+00:00</lastmod></url><url><loc>https://computings.org/2024/11/28/why-companies-are-quitting-kubernetes/</loc><lastmod>2024-11-28T21:48:54+00:00</lastmod></url><url><loc>https://computings.org/2024/11/28/spectro-cloud-secures-75m-series-c-to-drive-kubernetes-innovation-at-the-edge/</loc><lastmod>2024-11-28T21:49:03+00:00</lastmod></url><url><loc>https://computings.org/2024/11/28/the-cloud-native-revolution-harnessing-scalability-with-spring-boot-and-kubernetes/</loc><lastmod>2024-11-28T21:49:17+00:00</lastmod></url><url><loc>https://computings.org/2024/11/28/optimizing-java-applications-on-kubernetes-beyond-the-basics/</loc><lastmod>2024-11-28T21:49:34+00:00</lastmod></url><url><loc>https://computings.org/2024/11/28/open-source-champion-kelsey-hightower-on-the-promise-of-bluesky/</loc><lastmod>2024-11-28T21:49:42+00:00</lastmod></url><url><loc>https://computings.org/2024/11/28/gitpod-leaves-kubernetes-dead-end-failures-adopts-home-grown-tool/</loc><lastmod>2024-11-28T21:49:53+00:00</lastmod></url><url><loc>https://computings.org/2024/11/28/what-is-kubernetes/</loc><lastmod>2024-11-28T21:50:09+00:00</lastmod></url><url><loc>https://computings.org/2024/11/28/spectro-cloud-launches-edge-in-a-box-solution-with-hewlett-packard-enterprise-to-streamline-enterprise-kubernetes-adoption/</loc><lastmod>2024-11-28T21:50:18+00:00</lastmod></url><url><loc>https://computings.org/2024/11/28/simplify-multicloud-performance-with-new-cloud-native-technologies/</loc><lastmod>2024-11-28T21:50:32+00:00</lastmod></url><url><loc>https://computings.org/2024/11/28/kubernetes-llms-cast-ai-solves-the-cost-puzzle/</loc><lastmod>2024-11-28T21:50:43+00:00</lastmod></url><url><loc>https://computings.org/2024/11/28/top-10-kubernetes-tools/</loc><lastmod>2024-11-28T21:51:17+00:00</lastmod></url><url><loc>https://computings.org/2024/11/28/spectro-cloud-secures-75-million-in-series-c-funding/</loc><lastmod>2024-11-28T21:51:28+00:00</lastmod></url><url><loc>https://computings.org/2024/11/28/kubernetes-ai-insights-from-kubecon-cloudnativecon-na-2024/</loc><lastmod>2024-11-28T21:51:38+00:00</lastmod></url><url><loc>https://computings.org/2024/11/28/cloud-foundry-foundation-adds-marketplace-to-korifi-paas-for-kubernetes/</loc><lastmod>2024-11-28T21:51:47+00:00</lastmod></url><url><loc>https://computings.org/2024/11/28/trilio-for-kubernetes-v5-0-reduces-cloud-costs-and-accelerates-data-recovery-for-virtual-machine-data-protection-2/</loc><lastmod>2024-11-28T21:51:56+00:00</lastmod></url><url><loc>https://computings.org/2024/11/28/tintri-introduces-advanced-kubernetes-data-management-2/</loc><lastmod>2024-11-28T21:52:22+00:00</lastmod></url><url><loc>https://computings.org/2024/11/28/cloud-computing-removing-bottlenecks-in-kubernetes-services-2/</loc><lastmod>2024-11-28T21:52:34+00:00</lastmod></url><url><loc>https://computings.org/2024/11/28/kueue-can-now-schedule-kubernetes-batch-jobs-across-clusters-2/</loc><lastmod>2024-11-28T21:52:42+00:00</lastmod></url><url><loc>https://computings.org/2024/11/28/critical-kubernetes-vulnerability-let-attackers-execute-arbitrary-commands-2/</loc><lastmod>2024-11-28T21:52:54+00:00</lastmod></url><url><loc>https://computings.org/2024/11/28/how-hp-achieved-40-improvement-in-kubernetes-node-utilization-on-amazon-eks-using-karpenter-2/</loc><lastmod>2024-11-28T21:53:09+00:00</lastmod></url><url><loc>https://computings.org/2024/11/28/over-two-dozen-flaws-identified-in-advantech-industrial-wi-fi-access-points/</loc><lastmod>2024-11-28T21:53:23+00:00</lastmod></url><url><loc>https://computings.org/2024/11/28/researchers-sound-alarm-over-hackers-exploiting-critical-projectsend-vulnerability/</loc><lastmod>2024-11-28T21:53:37+00:00</lastmod></url><url><loc>https://computings.org/2024/11/28/how-to-set-up-hashicorp-vault-in-kubernetes-with-gcs-and-gcp-kms-a-complete-guide/</loc><lastmod>2024-11-28T21:57:53+00:00</lastmod></url><url><loc>https://computings.org/2024/11/28/malicious-actors-exploit-projectsend-critical-vulnerability/</loc><lastmod>2024-11-28T21:58:06+00:00</lastmod></url><url><loc>https://computings.org/2024/11/28/hpe-insight-remote-support-vulnerabilities-let-attackers-execute-remote-code/</loc><lastmod>2024-11-28T21:58:18+00:00</lastmod></url><url><loc>https://computings.org/2024/11/28/microsoft-patches-exploited-vulnerability-in-partner-network-website/</loc><lastmod>2024-11-28T21:58:29+00:00</lastmod></url><url><loc>https://computings.org/2024/11/28/critical-vulnerabilities-in-advantech-industrial-wireless-access-points-expose-critical-infrastructure-to-cyber-threats/</loc><lastmod>2024-11-28T21:58:42+00:00</lastmod></url><url><loc>https://computings.org/2024/11/28/china-conceling-state-corporate-academic-assets-for-offensive-attacks/</loc><lastmod>2024-11-28T21:58:54+00:00</lastmod></url><url><loc>https://computings.org/2024/11/28/new-windows-11-integer-overflow-vulnerability-lets-attackers-elevate-privileges/</loc><lastmod>2024-11-28T22:11:09+00:00</lastmod></url><url><loc>https://computings.org/2024/11/28/sensitive-dot-documents-found-vulnerable-to-hackers/</loc><lastmod>2024-11-28T22:11:21+00:00</lastmod></url><url><loc>https://computings.org/2024/11/28/critical-flaw-in-projectsend-under-active-exploitation-against-public-facing-servers/</loc><lastmod>2024-11-28T22:11:34+00:00</lastmod></url><url><loc>https://computings.org/2024/11/28/top-5-best-penetration-testing-services-in-2025/</loc><lastmod>2024-11-28T22:11:48+00:00</lastmod></url><url><loc>https://computings.org/2024/11/28/amberwolf-launches-nachovpn-tool-to-tackle-vpn-security-risks/</loc><lastmod>2024-11-28T22:11:57+00:00</lastmod></url><url><loc>https://computings.org/2024/11/28/chinese-apt-hackers-using-multiple-tools-and-vulnerabilities-to-attack-telecom-orgs/</loc><lastmod>2024-11-28T22:12:19+00:00</lastmod></url><url><loc>https://computings.org/2024/11/28/hackers-exploiting-projectsend-authentication-vulnerability-in-the-wild/</loc><lastmod>2024-11-28T22:12:29+00:00</lastmod></url><url><loc>https://computings.org/2024/11/28/projectsend-vulnerability-exploited-in-the-wild/</loc><lastmod>2024-11-28T22:12:40+00:00</lastmod></url><url><loc>https://computings.org/2024/11/28/apt-c-60-exploits-wps-office-vulnerability-to-deploy-spyglace-backdoor/</loc><lastmod>2024-11-28T22:12:53+00:00</lastmod></url><url><loc>https://computings.org/2024/11/28/russian-romcom-apt-group-leverages-zero-day-flaws-in-firefox-windows/</loc><lastmod>2024-11-28T22:13:05+00:00</lastmod></url><url><loc>https://computings.org/2024/11/28/microsoft-windows-hacking-warning-450-million-users-must-now-act/</loc><lastmod>2024-11-28T22:13:14+00:00</lastmod></url><url><loc>https://computings.org/2024/11/28/new-vpn-attack-demonstrated-against-palo-alto-networks-sonicwall-products/</loc><lastmod>2024-11-28T22:13:27+00:00</lastmod></url><url><loc>https://computings.org/2024/11/28/firefox-133-released-with-fix-for-multiple-security-vulnerabilities/</loc><lastmod>2024-11-28T22:13:43+00:00</lastmod></url><url><loc>https://computings.org/2024/11/28/vpn-vulnerabilities-drive-nearly-30-of-q3-ransomware-attacks/</loc><lastmod>2024-11-28T22:14:17+00:00</lastmod></url><url><loc>https://computings.org/2024/11/28/ibm-engineering-systems-flaw-let-attackers-bypass-security-restrictions/</loc><lastmod>2024-11-28T22:38:21+00:00</lastmod></url><url><loc>https://computings.org/2024/11/28/20-years-old-macos-vulnerability-allow-attackers-to-gain-root-access-remotely/</loc><lastmod>2024-11-28T22:38:33+00:00</lastmod></url><url><loc>https://computings.org/2024/11/28/vmware-aria-operations-vulnerabilities-allow-privilege-escalation-xss-attacks/</loc><lastmod>2024-11-28T22:53:15+00:00</lastmod></url><url><loc>https://computings.org/2024/11/28/geico-and-travelers-fined-11-3-million-for-data-breaches-exposing-120000/</loc><lastmod>2024-11-28T22:53:28+00:00</lastmod></url><url><loc>https://computings.org/2024/11/29/open-networking-edge-summit-2025-heads-to-london-alongside-kubecon-cloudnativecon-europe-march-31/</loc><lastmod>2024-11-29T20:34:33+00:00</lastmod></url><url><loc>https://computings.org/2024/11/29/spectro-cloud-kubernetes-management-company-raises-75-million-series-c/</loc><lastmod>2024-11-29T20:34:48+00:00</lastmod></url><url><loc>https://computings.org/2024/11/29/portworx-by-pure-storage-extends-platform-capabilities-to-accelerate-next-gen-kubernetes-workloads/</loc><lastmod>2024-11-29T20:35:00+00:00</lastmod></url><url><loc>https://computings.org/2024/11/29/kubecon-cloudnativecon-na-2024-yahoos-kubernetes-journey-on-prem-to-multi-cloud/</loc><lastmod>2024-11-29T20:35:13+00:00</lastmod></url><url><loc>https://computings.org/2024/11/29/cisa-issues-urgent-ics-advisories-on-hardware-flaws-in-schneider-electric-hitachi-energy-philips-vue-equipment/</loc><lastmod>2024-11-29T20:35:40+00:00</lastmod></url><url><loc>https://computings.org/2024/11/29/most-fortune-500-companies-lack-security-txt-files-how-big-of-the-deal-is-it/</loc><lastmod>2024-11-29T20:35:49+00:00</lastmod></url><url><loc>https://computings.org/2024/11/29/in-other-news-oppc-breach-impacts-1-7m-us-soldier-suspected-in-snowflake-hack-cloudflare-loses-logs/</loc><lastmod>2024-11-29T20:36:01+00:00</lastmod></url><url><loc>https://computings.org/2024/11/29/critical-ics-vulnerabilities-in-schneider-electric-myscada-automated-logic/</loc><lastmod>2024-11-29T20:36:12+00:00</lastmod></url><url><loc>https://computings.org/2024/11/29/windows-warning-as-new-0-click-backdoor-russian-cyber-attack-confirmed/</loc><lastmod>2024-11-29T20:36:27+00:00</lastmod></url><url><loc>https://computings.org/2024/11/29/hackers-can-access-laptop-webcams-without-activating-led-indicator/</loc><lastmod>2024-11-29T20:36:36+00:00</lastmod></url><url><loc>https://computings.org/2024/11/29/microsoft-fixes-ai-cloud-and-erp-security-flaws-one-exploited-in-active-attacks/</loc><lastmod>2024-11-29T20:36:48+00:00</lastmod></url><url><loc>https://computings.org/2024/11/29/hackers-actively-deploying-zyxel-firewall-flaw-to-deploy-ransomware/</loc><lastmod>2024-11-29T20:37:02+00:00</lastmod></url><url><loc>https://computings.org/2024/11/29/active-directory-certificate-services-vulnerability-let-attackers-escalate-privileges/</loc><lastmod>2024-11-29T20:37:13+00:00</lastmod></url><url><loc>https://computings.org/2024/11/29/microsoft-hacking-warning-450-million-windows-users-must-now-act/</loc><lastmod>2024-11-29T20:37:23+00:00</lastmod></url><url><loc>https://computings.org/2024/12/01/linux-foundation-announces-formation-of-the-jupyter-foundation-3/</loc><lastmod>2024-12-01T18:31:55+00:00</lastmod></url><url><loc>https://computings.org/2024/12/01/ocsf-joins-the-linux-foundation-accelerating-the-standardization-of-cybersecurity-data/</loc><lastmod>2024-12-01T18:32:08+00:00</lastmod></url><url><loc>https://computings.org/2024/12/01/kubernetes-market-will-generate-new-growth-opportunities-2024-2031/</loc><lastmod>2024-12-01T18:32:22+00:00</lastmod></url><url><loc>https://computings.org/2024/12/01/weekly-cybersecurity-newsletter-data-breaches-vulnerabilities-cyber-attacks-other-updates/</loc><lastmod>2024-12-01T18:32:43+00:00</lastmod></url><url><loc>https://computings.org/2024/12/01/rockstar-2fa-phishing-as-a-service-steals-microsoft-365-credentials-via-aitm-attacks/</loc><lastmod>2024-12-01T18:32:59+00:00</lastmod></url><url><loc>https://computings.org/2024/12/01/nvidia-bringing-ai-to-container-security/</loc><lastmod>2024-12-01T18:33:17+00:00</lastmod></url><url><loc>https://computings.org/2024/12/01/report-shows-the-threat-of-supply-chain-vulnerabilities-from-third-party-products/</loc><lastmod>2024-12-01T18:33:29+00:00</lastmod></url><url><loc>https://computings.org/2024/12/01/microsoft-to-deprecate-bring-your-own-license-defender-feature-for-cloud/</loc><lastmod>2024-12-01T18:33:52+00:00</lastmod></url><url><loc>https://computings.org/2024/12/01/inputsnatch-a-side-channel-attack-allow-attackers-steal-the-input-data-from-llm-models/</loc><lastmod>2024-12-01T18:34:07+00:00</lastmod></url><url><loc>https://computings.org/2024/12/01/critical-gpu-ddk-vulnerabilities-allow-attackers-to-execute-arbitrary-code-in-physical-memory/</loc><lastmod>2024-12-01T18:34:25+00:00</lastmod></url><url><loc>https://computings.org/2024/12/01/new-windows-backdoor-warning-0-click-backdoor-russian-cyber-attack/</loc><lastmod>2024-12-01T18:34:32+00:00</lastmod></url><url><loc>https://computings.org/2024/12/01/microsoft-addresses-critical-security-vulnerabilities-across-ai-and-cloud-services/</loc><lastmod>2024-12-01T18:34:43+00:00</lastmod></url><url><loc>https://computings.org/2024/12/01/microsoft-hacking-warning-450-million-windows-users-must-now-act-2/</loc><lastmod>2024-12-01T18:34:56+00:00</lastmod></url><url><loc>https://computings.org/2024/12/01/zabbix-sql-injection-vulnerability-let-attackers-gain-complete-control-of-instances/</loc><lastmod>2024-12-01T18:35:15+00:00</lastmod></url><url><loc>https://computings.org/2024/12/05/linux-foundation-releases-census-iii-open-source-report/</loc><lastmod>2024-12-05T18:11:46+00:00</lastmod></url><url><loc>https://computings.org/2024/12/05/linux-foundation-report-highlights-the-true-state-of-open-source-libraries-in-production-apps/</loc><lastmod>2024-12-05T18:12:01+00:00</lastmod></url><url><loc>https://computings.org/2024/12/05/open-source-usage-trends-and-security-challenges-revealed-in-new-study/</loc><lastmod>2024-12-05T18:12:15+00:00</lastmod></url><url><loc>https://computings.org/2024/12/05/linux-foundation-report-highlights-the-true-state-of-open-source-libraries-in-production-apps-2/</loc><lastmod>2024-12-05T18:12:26+00:00</lastmod></url><url><loc>https://computings.org/2024/12/05/open-source-usage-trends-and-security-challenges-revealed-in-new-study-2/</loc><lastmod>2024-12-05T18:12:38+00:00</lastmod></url><url><loc>https://computings.org/2024/12/05/the-open-source-community-relies-on-a-loyal-army-of-committed-developers-but-their-security-practices-are-putting-the-whole-ecosystem-at-risk/</loc><lastmod>2024-12-05T18:12:54+00:00</lastmod></url><url><loc>https://computings.org/2024/12/05/foss-security-concerns-increase-amid-widespread-adoption/</loc><lastmod>2024-12-05T18:13:04+00:00</lastmod></url><url><loc>https://computings.org/2024/12/05/even-the-linux-foundation-has-cyber-monday-deals-get-60-off-tech-training-courses/</loc><lastmod>2024-12-05T18:13:20+00:00</lastmod></url><url><loc>https://computings.org/2024/12/05/get-up-to-60-off-linux-foundation-tech-training-courses-and-certifications-for-cyber-week/</loc><lastmod>2024-12-05T18:13:34+00:00</lastmod></url><url><loc>https://computings.org/2024/12/05/get-certified-for-less-with-the-linux-foundations-cyber-monday-offer-60-off/</loc><lastmod>2024-12-05T18:13:48+00:00</lastmod></url><url><loc>https://computings.org/2024/12/05/its-time-to-make-kubernetes-disappear/</loc><lastmod>2024-12-05T18:14:04+00:00</lastmod></url><url><loc>https://computings.org/2024/12/05/linkerd-adds-egress-and-rate-limiting/</loc><lastmod>2024-12-05T18:14:22+00:00</lastmod></url><url><loc>https://computings.org/2024/12/05/salesforce-preps-heroku-paas-for-kubernetes-environments/</loc><lastmod>2024-12-05T18:14:38+00:00</lastmod></url><url><loc>https://computings.org/2024/12/05/scalability-challenges-at-the-edge-can-be-addressed-by-creating-independent-failure-domains-and-kubernetes-declarative-infrastructure-open-source-for-you/</loc><lastmod>2024-12-05T18:14:53+00:00</lastmod></url><url><loc>https://computings.org/2024/12/05/unlocking-value-minimizing-risk-in-the-kubernetes-ecosystem/</loc><lastmod>2024-12-05T18:15:12+00:00</lastmod></url><url><loc>https://computings.org/2024/12/05/getting-started-with-amazon-eks-auto-mode/</loc><lastmod>2024-12-05T18:15:30+00:00</lastmod></url><url><loc>https://computings.org/2024/12/05/which-kubernetes-distribution-you-should-use-for-your-homelab/</loc><lastmod>2024-12-05T18:15:54+00:00</lastmod></url><url><loc>https://computings.org/2024/12/05/diy-kubernetes-is-a-recipe-for-mayhem/</loc><lastmod>2024-12-05T18:16:10+00:00</lastmod></url><url><loc>https://computings.org/2024/12/05/reinvent-amazon-eks-gets-auto-mode-and-hybrid-nodes/</loc><lastmod>2024-12-05T18:16:27+00:00</lastmod></url><url><loc>https://computings.org/2024/12/05/modernizing-platform-management-hilti-groups-approach-to-improving-kubernetes-multicluster-operations/</loc><lastmod>2024-12-05T18:16:50+00:00</lastmod></url><url><loc>https://computings.org/2024/12/05/the-dangers-of-fashion-driven-tech-decisions/</loc><lastmod>2024-12-05T18:17:09+00:00</lastmod></url><url><loc>https://computings.org/2024/12/05/fashion-driven-tech-decisions/</loc><lastmod>2024-12-05T18:17:25+00:00</lastmod></url><url><loc>https://computings.org/2024/12/05/spectro-cloud-and-hpe-launch-edge-in-a-box-for-far-edge-kubernetes/</loc><lastmod>2024-12-05T18:17:44+00:00</lastmod></url><url><loc>https://computings.org/2024/12/05/kubernetes-solutions-market-2024-leading-player-analysis-market-size-2031/</loc><lastmod>2024-12-05T18:17:54+00:00</lastmod></url><url><loc>https://computings.org/2024/12/05/spectro-cloud-extends-amazon-eks-hybrid-nodes-for-seamless-edge-to-cloud-kubernetes/</loc><lastmod>2024-12-05T18:18:08+00:00</lastmod></url><url><loc>https://computings.org/2024/12/05/updating-burp-suite-enterprise-edition-on-kubernetes/</loc><lastmod>2024-12-05T18:18:25+00:00</lastmod></url><url><loc>https://computings.org/2024/12/05/warning-issued-for-10-year-old-vulnerability-security-leaders-discuss/</loc><lastmod>2024-12-05T18:18:36+00:00</lastmod></url><url><loc>https://computings.org/2024/12/05/enisas-2024-report-on-state-of-the-cybersecurity-focuses-on-fortifying-digital-frontier-provides-recommendations/</loc><lastmod>2024-12-05T18:18:49+00:00</lastmod></url><url><loc>https://computings.org/2024/12/05/mitel-micollab-zero-day-vulnerability-let-attackers-bypass-authentication/</loc><lastmod>2024-12-05T18:19:17+00:00</lastmod></url><url><loc>https://computings.org/2024/12/05/protecting-the-cloud-combating-credential-abuse-and-misconfigurations/</loc><lastmod>2024-12-05T18:19:45+00:00</lastmod></url><url><loc>https://computings.org/2024/12/05/thinkware-cloud-apk-vulnerability-let-attackers-execute-arbitrary-code/</loc><lastmod>2024-12-05T18:20:03+00:00</lastmod></url><url><loc>https://computings.org/2024/12/05/tools-needed-to-track-catalog-hardware-vulnerabilities/</loc><lastmod>2024-12-05T18:20:31+00:00</lastmod></url><url><loc>https://computings.org/2024/12/05/critical-vulnerabilities-found-in-veeam-service-provider-console/</loc><lastmod>2024-12-05T18:20:51+00:00</lastmod></url><url><loc>https://computings.org/2024/12/05/cisa-warns-of-active-exploitation-of-flaws-in-zyxel-projectsend-and-cyberpanel/</loc><lastmod>2024-12-05T18:21:18+00:00</lastmod></url><url><loc>https://computings.org/2024/12/05/how-the-shadowserver-foundation-helps-network-defenders-with-free-intelligence-feeds/</loc><lastmod>2024-12-05T18:21:39+00:00</lastmod></url><url><loc>https://computings.org/2024/12/05/sonicwall-issues-partner-notification-flagging-six-vulnerabilities-australian-cyber-security-magazine/</loc><lastmod>2024-12-05T18:22:05+00:00</lastmod></url><url><loc>https://computings.org/2024/12/05/the-end-of-matrix/</loc><lastmod>2024-12-05T18:22:26+00:00</lastmod></url><url><loc>https://computings.org/2024/12/05/without-validation-exposure-management-is-just-a-half-measure/</loc><lastmod>2024-12-05T18:22:45+00:00</lastmod></url><url><loc>https://computings.org/2024/12/05/deloitte-uk-hacked-brain-cipher-group-claim-to-have-stolen-1-tb-of-data/</loc><lastmod>2024-12-05T18:23:07+00:00</lastmod></url><url><loc>https://computings.org/2024/12/05/veeam-warns-of-critical-vulnerability-in-service-provider-console/</loc><lastmod>2024-12-05T18:23:23+00:00</lastmod></url><url><loc>https://computings.org/2024/12/05/critical-veeam-vulnerabilities-allow-remote-code-execution/</loc><lastmod>2024-12-05T18:23:48+00:00</lastmod></url><url><loc>https://computings.org/2024/12/05/cisco-warns-a-decade-old-vulnerability-is-back-and-targeting-users/</loc><lastmod>2024-12-05T18:24:09+00:00</lastmod></url><url><loc>https://computings.org/2024/12/05/european-council-enacts-cybersecurity-legislation-adopts-cyber-solidarity-act-targeted-amendment-to-cybersecurity-act/</loc><lastmod>2024-12-05T18:24:36+00:00</lastmod></url><url><loc>https://computings.org/2024/12/05/englobal-faces-cybersecurity-breach-leads-to-limited-access-to-essential-business-operations/</loc><lastmod>2024-12-05T18:24:59+00:00</lastmod></url><url><loc>https://computings.org/2024/12/05/global-cybersecurity-agencies-warn-of-chinese-espionage-threat-to-telecom-networks/</loc><lastmod>2024-12-05T18:25:23+00:00</lastmod></url><url><loc>https://computings.org/2024/12/05/shorter-lifespan-reduces-digital-certificate-vulns/</loc><lastmod>2024-12-05T18:25:45+00:00</lastmod></url><url><loc>https://computings.org/2024/12/05/solarwinds-platform-xss-vulnerability-let-attackers-inject-malicious-code/</loc><lastmod>2024-12-05T18:26:10+00:00</lastmod></url><url><loc>https://computings.org/2024/12/05/hr-it-related-phishing-emails-are-top-clicked-among-phishing-email-types/</loc><lastmod>2024-12-05T18:26:30+00:00</lastmod></url><url><loc>https://computings.org/2024/12/05/cisco-urges-immediate-patch-for-decade-old-webvpn-vulnerability/</loc><lastmod>2024-12-05T18:26:52+00:00</lastmod></url><url><loc>https://computings.org/2024/12/05/cisa-nsa-and-partners-issue-annual-report-on-top-exploited-vulnerabilities/</loc><lastmod>2024-12-05T18:27:11+00:00</lastmod></url><url><loc>https://computings.org/2024/12/05/bug-bounties-bringing-hackers-and-manufacturers-together/</loc><lastmod>2024-12-05T18:27:32+00:00</lastmod></url><url><loc>https://computings.org/2024/12/07/linux-foundation-report-spotlights-open-source-software-package-challenges/</loc><lastmod>2024-12-07T20:25:38+00:00</lastmod></url><url><loc>https://computings.org/2024/12/07/open-source-usage-trends-and-security-challenges-revealed-in-new-study-3/</loc><lastmod>2024-12-07T20:25:51+00:00</lastmod></url><url><loc>https://computings.org/2024/12/07/why-use-ipvs-instead-of-iptables-in-a-kubernetes-environment/</loc><lastmod>2024-12-07T20:26:06+00:00</lastmod></url><url><loc>https://computings.org/2024/12/07/5-reasons-to-build-a-mini-kubernetes-cluster-with-your-raspberry-pi/</loc><lastmod>2024-12-07T20:26:24+00:00</lastmod></url><url><loc>https://computings.org/2024/12/07/buoyant-update-to-linkerd-service-mesh-makes-applications-more-resilient/</loc><lastmod>2024-12-07T20:26:36+00:00</lastmod></url><url><loc>https://computings.org/2024/12/07/amazon-elastic-kubernetes-service-unifies-monitors-across-hybrid-clouds/</loc><lastmod>2024-12-07T20:26:47+00:00</lastmod></url><url><loc>https://computings.org/2024/12/07/explosive-growth-in-the-container-and-kubernetes-security-market-trends-industry-challenges-and-future-outlook-to-2030/</loc><lastmod>2024-12-07T20:26:59+00:00</lastmod></url><url><loc>https://computings.org/2024/12/07/five-ways-to-tighten-up-kubernetes-security/</loc><lastmod>2024-12-07T20:27:11+00:00</lastmod></url><url><loc>https://computings.org/2024/12/07/heroku-platform-announces-fully-cloud-native-service/</loc><lastmod>2024-12-07T20:27:22+00:00</lastmod></url><url><loc>https://computings.org/2024/12/07/salesforce-revamps-heroku-paas-for-kubernetes-net/</loc><lastmod>2024-12-07T20:27:32+00:00</lastmod></url><url><loc>https://computings.org/2024/12/07/justin-reock/</loc><lastmod>2024-12-07T20:27:50+00:00</lastmod></url><url><loc>https://computings.org/2024/12/07/damagecard-a-new-attack-exploits-sd-cards-to-compromise-system-memory/</loc><lastmod>2024-12-07T20:28:01+00:00</lastmod></url><url><loc>https://computings.org/2024/12/07/deloitte-data-breach-company-denies-the-breach-says-only-single-client-system-affected/</loc><lastmod>2024-12-07T20:28:09+00:00</lastmod></url><url><loc>https://computings.org/2024/12/07/the-fbi-wants-you-to-stop-texting-without-encryption-heres-why/</loc><lastmod>2024-12-07T20:28:21+00:00</lastmod></url><url><loc>https://computings.org/2024/12/07/security-and-vulnerability-management-global-market-analysis-trends-growth-research-and-forecast-2033/</loc><lastmod>2024-12-07T20:28:32+00:00</lastmod></url><url><loc>https://computings.org/2024/12/07/from-newbie-to-pro-my-journey-to-a-3000-bug-bounty/</loc><lastmod>2024-12-07T20:28:42+00:00</lastmod></url><url><loc>https://computings.org/2024/12/07/sonicwall-patches-6-vulnerabilities-in-secure-access-gateway/</loc><lastmod>2024-12-07T20:28:50+00:00</lastmod></url><url><loc>https://computings.org/2024/12/07/u-s-cisa-adds-cyberpanel-flaw-to-its-known-exploited-vulnerabilities-catalog/</loc><lastmod>2024-12-07T20:28:58+00:00</lastmod></url><url><loc>https://computings.org/2024/12/07/cybersecurity-agencies-update-secure-by-design-alert-to-counter-threats-select-secure-and-verifiable-technologies/</loc><lastmod>2024-12-07T20:29:11+00:00</lastmod></url><url><loc>https://computings.org/2024/12/07/nozomi-detects-security-vulnerabilities-in-wago-plc-firmware-updated-to-prevent-privilege-escalation/</loc><lastmod>2024-12-07T20:29:24+00:00</lastmod></url><url><loc>https://computings.org/2024/12/07/researchers-uncover-flaws-in-popular-open-source-machine-learning-frameworks/</loc><lastmod>2024-12-07T20:29:35+00:00</lastmod></url><url><loc>https://computings.org/2024/12/07/opentext-partnership-targets-software-supply-chain-fears/</loc><lastmod>2024-12-07T20:29:45+00:00</lastmod></url><url><loc>https://computings.org/2024/12/07/rockwell-automation-vulnerabilities-let-attackers-execute-remote-code/</loc><lastmod>2024-12-07T20:29:54+00:00</lastmod></url><url><loc>https://computings.org/2024/12/07/new-qr-code-based-c2-attack-lets-hackers-bypass-all-type-of-browser-isolation-security/</loc><lastmod>2024-12-07T20:30:03+00:00</lastmod></url><url><loc>https://computings.org/2024/12/07/critical-vulnerability-discovered-in-sailpoint-identityiq/</loc><lastmod>2024-12-07T20:30:13+00:00</lastmod></url><url><loc>https://computings.org/2024/12/07/critical-windows-zero-day-vulnerability-lets-attackers-steal-users-ntlm-credentials/</loc><lastmod>2024-12-07T20:30:27+00:00</lastmod></url><url><loc>https://computings.org/2024/12/07/windows-ntlm-zero-day-vulnerability-exposes-user-credentials/</loc><lastmod>2024-12-07T20:30:37+00:00</lastmod></url><url><loc>https://computings.org/2024/12/07/microsoft-spots-another-china-spy-crew-stealing-us-data/</loc><lastmod>2024-12-07T20:30:48+00:00</lastmod></url><url><loc>https://computings.org/2024/12/07/8-biggest-cybersecurity-threats-manufacturers-face/</loc><lastmod>2024-12-07T20:31:16+00:00</lastmod></url><url><loc>https://computings.org/2024/12/07/balbix-unveils-new-ai-powered-cybersecurity-tools/</loc><lastmod>2024-12-07T20:31:28+00:00</lastmod></url><url><loc>https://computings.org/2024/12/07/achieve-efficient-prioritization-with-flashpoints-enriched-vulnerability-intelligence/</loc><lastmod>2024-12-07T20:31:37+00:00</lastmod></url><url><loc>https://computings.org/2024/12/07/wordpress-gutenberg-editor-vulnerability-let-attackers-inject-malicious-scripts/</loc><lastmod>2024-12-07T20:31:48+00:00</lastmod></url><url><loc>https://computings.org/2024/12/07/critical-mitel-micollab-flaw-exposes-systems-to-unauthorized-file-and-admin-access/</loc><lastmod>2024-12-07T20:31:57+00:00</lastmod></url><url><loc>https://computings.org/2024/12/19/linux-foundation-announces-launch-of-lf-india-to-expand-global-open-source-support-and-innovation/</loc><lastmod>2024-12-19T21:02:43+00:00</lastmod></url><url><loc>https://computings.org/2024/12/19/inside-linux-foundations-vision-for-open-source-models/</loc><lastmod>2024-12-19T21:03:02+00:00</lastmod></url><url><loc>https://computings.org/2024/12/19/driving-open-source-innovation-linux-foundations-global-vision/</loc><lastmod>2024-12-19T21:03:24+00:00</lastmod></url><url><loc>https://computings.org/2024/12/19/linux-foundation-launches-lf-india-to-boost-open-source-innovation/</loc><lastmod>2024-12-19T21:03:43+00:00</lastmod></url><url><loc>https://computings.org/2024/12/19/linux-foundation-launches-lf-india-to-enhance-open-source-collaboration/</loc><lastmod>2024-12-19T21:03:58+00:00</lastmod></url><url><loc>https://computings.org/2024/12/19/linux-foundation-launches-lf-india-to-enhance-open-source-collaboration-2/</loc><lastmod>2024-12-19T21:04:08+00:00</lastmod></url><url><loc>https://computings.org/2024/12/19/linux-foundation-sets-up-india-entity-to-boost-open-source-collaboration/</loc><lastmod>2024-12-19T21:04:23+00:00</lastmod></url><url><loc>https://computings.org/2024/12/19/linux-foundation-launches-lf-india-to-boost-open-source-innovation-2/</loc><lastmod>2024-12-19T21:04:37+00:00</lastmod></url><url><loc>https://computings.org/2024/12/19/linux-foundation-unveils-lf-india-a-new-hub-for-open-source-innovation-and-collaboration/</loc><lastmod>2024-12-19T21:04:54+00:00</lastmod></url><url><loc>https://computings.org/2024/12/19/linux-foundation-launches-lf-india-to-boost-open-source-collaboration/</loc><lastmod>2024-12-19T21:05:04+00:00</lastmod></url><url><loc>https://computings.org/2024/12/19/linux-foundation-expands-global-footprint-with-strategic-india-launch/</loc><lastmod>2024-12-19T21:05:16+00:00</lastmod></url><url><loc>https://computings.org/2024/12/19/linux-foundation-announces-launch-of-lf-india-to-expand-global-open-source-support-and-innovation-2/</loc><lastmod>2024-12-19T21:05:29+00:00</lastmod></url><url><loc>https://computings.org/2024/12/19/linux-foundation-announces-launch-of-lf-india-to-expand-global-open-source-support-and-innovation-crn/</loc><lastmod>2024-12-19T21:05:41+00:00</lastmod></url><url><loc>https://computings.org/2024/12/19/linux-foundation-launches-lf-india-to-boost-open-source-software-collaboration-and-innovation/</loc><lastmod>2024-12-19T21:05:51+00:00</lastmod></url><url><loc>https://computings.org/2024/12/19/linux-foundation-launches-lf-india-to-boost-open-source-software-collaboration-and-innovation-2/</loc><lastmod>2024-12-19T21:06:06+00:00</lastmod></url><url><loc>https://computings.org/2024/12/19/linux-foundation-announces-launch-of-lf-india-to-expand-global-open-source-support-and-innovation-3/</loc><lastmod>2024-12-19T21:06:18+00:00</lastmod></url><url><loc>https://computings.org/2024/12/19/linux-foundation-announces-launch-of-lf-india-to-expand-global-open-source-support-and-innovation-4/</loc><lastmod>2024-12-19T21:06:32+00:00</lastmod></url><url><loc>https://computings.org/2024/12/19/in-the-face-of-mounting-regulatory-oversight-honda-and-guidewire-join-industry-leaders-securing-software-development-at-the-open-source-security-foundation-openssf/</loc><lastmod>2024-12-19T21:06:46+00:00</lastmod></url><url><loc>https://computings.org/2024/12/19/tech-news-today-live-updates-on-december-11-2024-crossbeats-clip-m01-wireless-mic-review-budget-friendly-but-far-from-reliable/</loc><lastmod>2024-12-19T21:07:01+00:00</lastmod></url><url><loc>https://computings.org/2024/12/19/in-the-face-of-mounting-regulatory-oversight-honda-and-guidewire-join-industry-leaders-securing-software-development-at-the-open-source-security-foundation-openssf-2/</loc><lastmod>2024-12-19T21:07:15+00:00</lastmod></url><url><loc>https://computings.org/2024/12/19/in-the-face-of-mounting-regulatory-oversight-honda-and-guidewire-join-industry-leaders-securing-software-development-at-the-open-source-security-foundation-openssf-3/</loc><lastmod>2024-12-19T21:07:32+00:00</lastmod></url><url><loc>https://computings.org/2024/12/19/linux-foundation-report-spotlights-open-source-software-package-challenges-2/</loc><lastmod>2024-12-19T21:07:48+00:00</lastmod></url><url><loc>https://computings.org/2024/12/19/open-source-k0smotron-wins-infoworld-technology-of-the-year-award-for-application-management/</loc><lastmod>2024-12-19T21:07:59+00:00</lastmod></url><url><loc>https://computings.org/2024/12/19/kubernetes-update-makes-platform-easier-to-scale-up/</loc><lastmod>2024-12-19T21:08:11+00:00</lastmod></url><url><loc>https://computings.org/2024/12/19/exploring-ebpf-and-its-integration-with-kubernetes-open-source-for-you/</loc><lastmod>2024-12-19T21:08:26+00:00</lastmod></url><url><loc>https://computings.org/2024/12/19/latest-kubernetes-update-makes-platform-simpler-to-scale/</loc><lastmod>2024-12-19T21:08:42+00:00</lastmod></url><url><loc>https://computings.org/2024/12/19/top-10-kubernetes-and-storage-stories-of-2024/</loc><lastmod>2024-12-19T21:08:59+00:00</lastmod></url><url><loc>https://computings.org/2024/12/19/groundcovers-ebpf-driven-observability-platform-eliminates-blind-spots-in-opentelemetry/</loc><lastmod>2024-12-19T21:09:14+00:00</lastmod></url><url><loc>https://computings.org/2024/12/19/introducing-kubernetes-integration-discover-apis-in-kubernetes/</loc><lastmod>2024-12-19T21:09:32+00:00</lastmod></url><url><loc>https://computings.org/2024/12/19/openai-blamed-its-three-hour-outage-on-a-new-telemetry-service/</loc><lastmod>2024-12-19T21:09:47+00:00</lastmod></url><url><loc>https://computings.org/2024/12/19/openai-says-deployment-of-telemetry-service-caused-3-hour-outage/</loc><lastmod>2024-12-19T21:10:03+00:00</lastmod></url><url><loc>https://computings.org/2024/12/19/mirantis-adds-kubevirt-to-further-streamline-management-of-kubernetes-environments/</loc><lastmod>2024-12-19T21:10:16+00:00</lastmod></url><url><loc>https://computings.org/2024/12/19/securely-deploy-and-run-multiple-tenants-on-kubernetes/</loc><lastmod>2024-12-19T21:10:34+00:00</lastmod></url><url><loc>https://computings.org/2024/12/19/openai-blames-its-massive-chatgpt-outage-on-a-new-telemetry-service/</loc><lastmod>2024-12-19T21:10:48+00:00</lastmod></url><url><loc>https://computings.org/2024/12/19/deploying-large-language-models-on-kubernetes-open-source-for-you/</loc><lastmod>2024-12-19T21:11:06+00:00</lastmod></url><url><loc>https://computings.org/2024/12/19/kubernetes-1-32-penelope-introduces-key-innovations/</loc><lastmod>2024-12-19T21:11:19+00:00</lastmod></url><url><loc>https://computings.org/2024/12/19/how-to-migrate-cloud-foundry-applications-to-docker-containers-on-a-kubernetes-cluster/</loc><lastmod>2024-12-19T21:11:41+00:00</lastmod></url><url><loc>https://computings.org/2024/12/19/kubernetes-end-to-end-testing-using-testcontainers-and-python/</loc><lastmod>2024-12-19T21:11:56+00:00</lastmod></url><url><loc>https://computings.org/2024/12/19/kubernetes-1-32-aces-api-conformance-testing/</loc><lastmod>2024-12-19T21:12:10+00:00</lastmod></url><url><loc>https://computings.org/2024/12/19/cryptojacking-campaign-targets-docker-and-kubernetes-surge-in-container-based-attacks-socradar-cyber-intelligence-inc/</loc><lastmod>2024-12-19T21:12:24+00:00</lastmod></url><url><loc>https://computings.org/2024/12/19/from-pod-fails-to-pod-tales-turning-kubernetes-chaos-into-comedy-gold/</loc><lastmod>2024-12-19T21:12:38+00:00</lastmod></url><url><loc>https://computings.org/2024/12/19/gigaom-radar-for-kubernetes-data-protection/</loc><lastmod>2024-12-19T21:12:50+00:00</lastmod></url><url><loc>https://computings.org/2024/12/19/cast-ai-expands-into-indias-kubernetes-market/</loc><lastmod>2024-12-19T21:13:03+00:00</lastmod></url><url><loc>https://computings.org/2024/12/19/cast-ai-expands-into-indias-thriving-kubernetes-market/</loc><lastmod>2024-12-19T21:13:14+00:00</lastmod></url><url><loc>https://computings.org/2024/12/19/portworx-by-pure-storage-extends-platform-capabilities-to-accelerate-next-gen-kubernetes-workloads-2/</loc><lastmod>2024-12-19T21:13:28+00:00</lastmod></url><url><loc>https://computings.org/2024/12/19/how-do-you-resolve-a-kubernetes-namespace-stuck-in-a-terminating-state/</loc><lastmod>2024-12-19T21:13:42+00:00</lastmod></url><url><loc>https://computings.org/2024/12/19/orgs-scramble-to-fix-actively-exploited-bug-in-struts-2/</loc><lastmod>2024-12-19T21:13:59+00:00</lastmod></url><url><loc>https://computings.org/2024/12/19/mccrary-policy-brief-outlines-how-federal-policy-changes-can-transform-cybersecurity-economics-for-critical-infrastructure/</loc><lastmod>2024-12-19T21:14:13+00:00</lastmod></url><url><loc>https://computings.org/2024/12/19/beyondtrust-remote-access-support-flaw-enables-command-injection-attacks/</loc><lastmod>2024-12-19T21:14:24+00:00</lastmod></url><url><loc>https://computings.org/2024/12/19/hackers-exploiting-forticlient-ems-vulnerability-cve-2023-48788-in-the-wild/</loc><lastmod>2024-12-19T21:14:42+00:00</lastmod></url><url><loc>https://computings.org/2024/12/19/next-js-authorization-bypass-vulnerability-exposes-root-level-pages/</loc><lastmod>2024-12-19T21:14:59+00:00</lastmod></url><url><loc>https://computings.org/2024/12/19/fortinet-warns-of-critical-fortiwlm-flaw-update-required-to-prevent-exploitation/</loc><lastmod>2024-12-19T21:15:15+00:00</lastmod></url><url><loc>https://computings.org/2024/12/19/vulnerability-exploit-assessment-tool-epss-exposed-to-adversarial-atta/</loc><lastmod>2024-12-19T21:15:28+00:00</lastmod></url><url><loc>https://computings.org/2024/12/19/cisa-warns-of-4-new-vulnerabilities-exploited-in-the-wild/</loc><lastmod>2024-12-19T21:15:44+00:00</lastmod></url><url><loc>https://computings.org/2024/12/19/internet-exposed-hmis-are-a-risk-to-water-facilities-cisa-warns/</loc><lastmod>2024-12-19T21:16:02+00:00</lastmod></url><url><loc>https://computings.org/2024/12/19/fortinet-vulnerabilities-let-attackers-execute-arbitrary-code-remotely/</loc><lastmod>2024-12-19T21:16:17+00:00</lastmod></url><url><loc>https://computings.org/2024/12/19/fortinet-warns-of-critical-vulnerabilitiy-allows-command-injection-file-read/</loc><lastmod>2024-12-19T21:16:33+00:00</lastmod></url><url><loc>https://computings.org/2024/12/19/critical-chrome-vulnerabilities-allow-remote-code-execution-update-now/</loc><lastmod>2024-12-19T21:16:51+00:00</lastmod></url><url><loc>https://computings.org/2024/12/19/us-eyes-ban-on-tp-link-routers-amid-cybersecurity-concerns/</loc><lastmod>2024-12-19T21:17:06+00:00</lastmod></url><url><loc>https://computings.org/2024/12/19/us-to-ban-tp-link-routers-as-they-fuel-chinese-cyber-attacks/</loc><lastmod>2024-12-19T21:17:25+00:00</lastmod></url><url><loc>https://computings.org/2024/12/19/cisa-urges-use-of-end-to-end-encrypted-messaging-services-like-signal-following-u-s-telecoms-hack/</loc><lastmod>2024-12-19T21:17:41+00:00</lastmod></url><url><loc>https://computings.org/2024/12/19/steps-to-trurisk-insight-to-action-with-vmdr/</loc><lastmod>2024-12-19T21:17:52+00:00</lastmod></url><url><loc>https://computings.org/2024/12/19/vulnerabilities-abound-three-ways-to-stay-ahead-of-attackers/</loc><lastmod>2024-12-19T21:18:00+00:00</lastmod></url><url><loc>https://computings.org/2024/12/19/threat-actors-are-attempting-to-exploit-apache-struts-vulnerability-cve-2024-53677/</loc><lastmod>2024-12-19T21:18:09+00:00</lastmod></url><url><loc>https://computings.org/2024/12/19/netspi-pioneers-continuous-asset-exposure-management-with-new-external-attack-surface-management-solutions/</loc><lastmod>2024-12-19T21:18:21+00:00</lastmod></url><url><loc>https://computings.org/2024/12/19/video-hackers-bypass-tsa-security-with-sql-injection/</loc><lastmod>2024-12-19T21:18:37+00:00</lastmod></url><url><loc>https://computings.org/2024/12/19/multiple-gstreamer-vulnerabilities-impact-linux-distributions-using-gnome/</loc><lastmod>2024-12-19T21:18:57+00:00</lastmod></url><url><loc>https://computings.org/2024/12/19/beyondtrust-issues-urgent-patch-for-critical-vulnerability-in-pra-and-rs-products/</loc><lastmod>2024-12-19T21:19:10+00:00</lastmod></url><url><loc>https://computings.org/2024/12/19/watch-now-navigating-your-ot-cybersecurity-journey-from-assessment-to-implementation/</loc><lastmod>2024-12-19T21:19:29+00:00</lastmod></url><url><loc>https://computings.org/2024/12/19/attack-exposure-unpatched-cleo-managed-file-transfer-software/</loc><lastmod>2024-12-19T21:19:40+00:00</lastmod></url><url><loc>https://computings.org/2024/12/19/beyondtrust-patches-critical-vulnerability-discovered-during-security-incident-probe/</loc><lastmod>2024-12-19T21:19:49+00:00</lastmod></url><url><loc>https://computings.org/2025/01/05/kubernetes-in-2025-are-you-ready-for-these-top-5-trends-predictions/</loc><lastmod>2025-01-05T21:46:51+00:00</lastmod></url><url><loc>https://computings.org/2025/01/05/best-of-2024-red-hat-openshift-update-simplifies-network-edge-deployments/</loc><lastmod>2025-01-05T21:47:06+00:00</lastmod></url><url><loc>https://computings.org/2025/01/05/azure-compromise-possible-with-apache-airflow-vulnerabilities/</loc><lastmod>2025-01-05T21:47:23+00:00</lastmod></url><url><loc>https://computings.org/2025/01/05/trilio-named-leader-and-fast-mover-in-kubernetes-data-protection-by-gigaom-research-for-4th-time/</loc><lastmod>2025-01-05T21:47:38+00:00</lastmod></url><url><loc>https://computings.org/2025/01/05/kubernetes-llms-cast-ai-solves-the-cost-puzzle-startupnews-fyi-startup-technology-news/</loc><lastmod>2025-01-05T21:48:00+00:00</lastmod></url><url><loc>https://computings.org/2025/01/05/best-of-2024-cast-ai-helps-cost-optimize-llms-running-on-kubernetes/</loc><lastmod>2025-01-05T21:48:21+00:00</lastmod></url><url><loc>https://computings.org/2025/01/05/misconfigured-kubernetes-rbac-in-azure-airflow-could-expose-entire-cluster-to-exploitation/</loc><lastmod>2025-01-05T21:48:40+00:00</lastmod></url><url><loc>https://computings.org/2025/01/05/kubernetes-1-32-released-with-dynamic-resource-allocation-and-graceful-shutdown-of-windows-nodes/</loc><lastmod>2025-01-05T21:49:26+00:00</lastmod></url><url><loc>https://computings.org/2025/01/05/gitpod-flex-cloud-development-after-kubernetes/</loc><lastmod>2025-01-05T21:50:18+00:00</lastmod></url><url><loc>https://computings.org/2025/01/05/best-of-2024-archives/</loc><lastmod>2025-01-05T21:50:37+00:00</lastmod></url><url><loc>https://computings.org/2025/01/05/what-is-kubernetes-2/</loc><lastmod>2025-01-05T21:51:56+00:00</lastmod></url><url><loc>https://computings.org/2025/01/05/i-built-a-kubernetes-cluster-with-my-raspberry-pis-heres-how-you-can-too/</loc><lastmod>2025-01-05T21:52:22+00:00</lastmod></url><url><loc>https://computings.org/2025/01/05/aws-unveils-eks-auto-mode-and-hybrid-nodes-for-kubernetes/</loc><lastmod>2025-01-05T21:52:34+00:00</lastmod></url><url><loc>https://computings.org/2025/01/05/kubernetes-rust-linux-and-dos-the-year-in-open-source/</loc><lastmod>2025-01-05T21:53:59+00:00</lastmod></url><url><loc>https://computings.org/2025/01/05/best-of-2024-mirantis-releases-k0smotron-1-0-to-simplify-kubernetes-cluster-management/</loc><lastmod>2025-01-05T21:54:15+00:00</lastmod></url><url><loc>https://computings.org/2025/01/05/podman-a-powerful-alternative-to-docker-open-source-for-you/</loc><lastmod>2025-01-05T21:54:48+00:00</lastmod></url><url><loc>https://computings.org/2025/01/05/best-of-2024-ai-emerges-as-next-major-kubernetes-challenge/</loc><lastmod>2025-01-05T21:56:09+00:00</lastmod></url><url><loc>https://computings.org/2025/01/05/advent-of-cyber-2024-day-22/</loc><lastmod>2025-01-05T21:56:59+00:00</lastmod></url><url><loc>https://computings.org/2025/01/05/best-10-kubernetes-security-tools-for-2025/</loc><lastmod>2025-01-05T21:57:43+00:00</lastmod></url><url><loc>https://computings.org/2025/01/05/what-is-eks-auto-mode-and-will-it-fully-manage-my-kubernetes/</loc><lastmod>2025-01-05T21:59:04+00:00</lastmod></url><url><loc>https://computings.org/2025/01/05/open-source-k0smotron-wins-infoworld-technology-of-the-year-award-for-application-management-2/</loc><lastmod>2025-01-05T21:59:35+00:00</lastmod></url><url><loc>https://computings.org/2025/01/05/how-cert-manager-got-to-500-million-downloads-a-month/</loc><lastmod>2025-01-05T22:00:00+00:00</lastmod></url><url><loc>https://computings.org/2025/01/05/researchers-uncover-nuclei-vulnerability-enabling-signature-bypass-and-code-execution/</loc><lastmod>2025-01-05T22:01:23+00:00</lastmod></url><url><loc>https://computings.org/2025/01/05/dangerous-gmail-security-threat-confirmed-but-google-wont-fix-it/</loc><lastmod>2025-01-05T22:01:55+00:00</lastmod></url><url><loc>https://computings.org/2025/01/05/u-s-treasury-sanctions-beijing-cybersecurity-firm-for-state-backed-hacking-campaigns/</loc><lastmod>2025-01-05T22:03:17+00:00</lastmod></url><url><loc>https://computings.org/2025/01/05/thousands-of-buggy-beyondtrust-systems-remain-exposed/</loc><lastmod>2025-01-05T22:03:35+00:00</lastmod></url><url><loc>https://computings.org/2025/01/05/treasury-hack-lawmakers-seek-more-details-on-scope-third-party-vulnerabilities/</loc><lastmod>2025-01-05T22:03:55+00:00</lastmod></url><url><loc>https://computings.org/2025/01/05/2025-forecast-ai-to-supercharge-attacks-quantum-threats-grow-saas-security-woes/</loc><lastmod>2025-01-05T22:04:38+00:00</lastmod></url><url><loc>https://computings.org/2025/01/05/exploit-code-published-for-potentially-dangerous-windows-ldap-vulnerability/</loc><lastmod>2025-01-05T22:04:58+00:00</lastmod></url><url><loc>https://computings.org/2025/01/05/asus-routers-vulnerabilities-allows-arbitrary-code-execution/</loc><lastmod>2025-01-05T22:05:15+00:00</lastmod></url><url><loc>https://computings.org/2025/01/05/censys-researchers-warn-8600-beyondtrust-instances-still-exposed/</loc><lastmod>2025-01-05T22:06:37+00:00</lastmod></url><url><loc>https://computings.org/2025/01/05/sophos-firewall-vulnerabilities-could-allow-remote-attacks/</loc><lastmod>2025-01-05T22:07:58+00:00</lastmod></url><url><loc>https://computings.org/2025/01/05/new-post-authentication-vulnerability-discovered-in-four-faith-industrial-routers/</loc><lastmod>2025-01-05T22:08:13+00:00</lastmod></url><url><loc>https://computings.org/2025/01/05/the-cyber-year-in-stories-autumn-2024/</loc><lastmod>2025-01-05T22:08:27+00:00</lastmod></url><url><loc>https://computings.org/2025/01/05/ldapnightmare-poc-exploit-crashes-lsass-and-reboots-windows-domain-controllers/</loc><lastmod>2025-01-05T22:09:47+00:00</lastmod></url><url><loc>https://computings.org/2025/01/05/gmail-security-threat-confirmed-google-wont-fix-it-heres-why/</loc><lastmod>2025-01-05T22:10:34+00:00</lastmod></url><url><loc>https://computings.org/2025/01/05/corporate-cover-up-behind-world-beating-cyber-security-record-in-mi/</loc><lastmod>2025-01-05T22:10:53+00:00</lastmod></url><url><loc>https://computings.org/2025/01/05/sysbumps-new-kernel-break-attack-bypassing-macos-systems-security/</loc><lastmod>2025-01-05T22:11:07+00:00</lastmod></url><url><loc>https://computings.org/2025/01/05/proposed-hipaa-amendments-will-close-healthcare-security-gaps/</loc><lastmod>2025-01-05T22:11:24+00:00</lastmod></url><url><loc>https://computings.org/2025/01/05/active-directory-flaw-can-crash-any-microsoft-server/</loc><lastmod>2025-01-05T22:11:39+00:00</lastmod></url><url><loc>https://computings.org/2025/01/05/fake-7-zip-exploit-code-traced-to-ai-generated-misinterpretation/</loc><lastmod>2025-01-05T22:13:03+00:00</lastmod></url><url><loc>https://computings.org/2025/01/05/best-of-2024-cisco-vulnerability-cisa-alerts-of-smart-install-exploits/</loc><lastmod>2025-01-05T22:13:34+00:00</lastmod></url><url><loc>https://computings.org/2025/01/05/the-future-of-mobile-security-challenges-and-solutions/</loc><lastmod>2025-01-05T22:14:37+00:00</lastmod></url><url><loc>https://computings.org/2025/01/05/severe-security-flaws-patched-in-microsoft-dynamics-365-and-power-apps-web-api/</loc><lastmod>2025-01-05T22:14:58+00:00</lastmod></url><url><loc>https://computings.org/2025/01/05/severe-u-s-treasury-breach-just-the-latest-of-several-china-attacks/</loc><lastmod>2025-01-05T22:15:13+00:00</lastmod></url><url><loc>https://computings.org/2025/01/05/combating-cyber-vulnerabilities/</loc><lastmod>2025-01-05T22:15:27+00:00</lastmod></url><url><loc>https://computings.org/2025/01/05/the-silent-vulnerabilities-of-operational-technology/</loc><lastmod>2025-01-05T22:15:43+00:00</lastmod></url><url><loc>https://computings.org/2025/01/06/how-ai-software-firm-one-data-protected-its-kubernetes-environment-with-kasten-k10/</loc><lastmod>2025-01-06T21:18:26+00:00</lastmod></url><url><loc>https://computings.org/2025/01/06/mediatek-says-happy-new-year-with-critical-rce-other-bugs/</loc><lastmod>2025-01-06T21:18:44+00:00</lastmod></url><url><loc>https://computings.org/2025/01/06/10-best-cybersecurity-certifications-for-2025-career-growth/</loc><lastmod>2025-01-06T21:19:03+00:00</lastmod></url><url><loc>https://computings.org/2025/01/06/current-and-future-analysis-of-cybersecurity-vulnerability-assessment-service-market-with-new-business-strategies-and-forecast-by-2031-aress-software-astra-security-breachlock-cobalt-iron/</loc><lastmod>2025-01-06T21:19:16+00:00</lastmod></url><url><loc>https://computings.org/2025/01/06/%e2%9a%a1-thn-weekly-recap-top-cybersecurity-threats-tools-and-tips-6-jan/</loc><lastmod>2025-01-06T21:19:38+00:00</lastmod></url><url><loc>https://computings.org/2025/01/06/from-22m-in-ransom-to-100m-stolen-records-2025s-all-star-saas-threat-actors-to-watch/</loc><lastmod>2025-01-06T21:19:53+00:00</lastmod></url><url><loc>https://computings.org/2025/01/06/the-true-cost-of-a-security-breach/</loc><lastmod>2025-01-06T21:20:08+00:00</lastmod></url><url><loc>https://computings.org/2025/01/06/poc-exploit-released-for-openssh-arbitrary-code-execution-vulnerability/</loc><lastmod>2025-01-06T21:20:24+00:00</lastmod></url><url><loc>https://computings.org/2025/01/06/new-hack-threatens-new-york-internet-users/</loc><lastmod>2025-01-06T21:20:41+00:00</lastmod></url><url><loc>https://computings.org/2025/01/06/cybersecurity-in-2025-a-look-back-at-2024s-biggest-cyber-attacks-lessons-for-the-future-socradar-cyber-intelligence-inc/</loc><lastmod>2025-01-06T21:20:57+00:00</lastmod></url><url><loc>https://computings.org/2025/01/06/bad-likert-judge-new-technique-to-jainbreak-ai-using-llm-vulnerabilities/</loc><lastmod>2025-01-06T21:21:11+00:00</lastmod></url><url><loc>https://computings.org/2025/01/06/open-source-vulnerability-scanner-found-with-a-serious-vulnerability-in-its-own-code/</loc><lastmod>2025-01-06T21:21:25+00:00</lastmod></url><url><loc>https://computings.org/2025/01/06/only-26-of-europes-top-companies-earn-a-high-rating-for-cybersecurity/</loc><lastmod>2025-01-06T21:21:39+00:00</lastmod></url><url><loc>https://computings.org/2025/01/06/aws-repeats-same-critical-rce-vulnerability-3-times-in-4-years/</loc><lastmod>2025-01-06T21:21:51+00:00</lastmod></url><url><loc>https://computings.org/2025/01/06/high-severity-vulnerability-discovered-in-nuclei-what-you-need-to-know/</loc><lastmod>2025-01-06T21:22:18+00:00</lastmod></url><url><loc>https://computings.org/2025/01/06/poc-exploit-released-for-windows-registry-privilege-elevation-vulnerability/</loc><lastmod>2025-01-06T21:22:36+00:00</lastmod></url><url><loc>https://computings.org/2025/01/06/a-signature-verification-bypass-in-nuclei-cve-2024-43405/</loc><lastmod>2025-01-06T21:22:47+00:00</lastmod></url><url><loc>https://computings.org/2025/01/08/reddit-no-longer-haunted-by-drifting-kubernetes-configurations/</loc><lastmod>2025-01-08T22:10:35+00:00</lastmod></url><url><loc>https://computings.org/2025/01/08/5-game-changing-trends-for-2025-kubernetes-leads-the-way/</loc><lastmod>2025-01-08T22:10:55+00:00</lastmod></url><url><loc>https://computings.org/2025/01/08/key-trends-for-kubernetes-security-in-2024/</loc><lastmod>2025-01-08T22:11:09+00:00</lastmod></url><url><loc>https://computings.org/2025/01/08/kubernetes-service-mesh-market-size-trends-and-industry-growth-forecast-to-2032/</loc><lastmod>2025-01-08T22:11:20+00:00</lastmod></url><url><loc>https://computings.org/2025/01/08/6-kubernetes-security-companies-in-2025/</loc><lastmod>2025-01-08T22:11:39+00:00</lastmod></url><url><loc>https://computings.org/2025/01/08/why-businesses-need-a-cloud-agnostic-approach-to-sql-server-uptime-with-kubernetes/</loc><lastmod>2025-01-08T22:11:54+00:00</lastmod></url><url><loc>https://computings.org/2025/01/08/best-of-2024-kubernetes-security-best-practices-for-2024/</loc><lastmod>2025-01-08T22:12:10+00:00</lastmod></url><url><loc>https://computings.org/2025/01/08/ivanti-warns-of-new-zero-day-attacks-hitting-connect-secure-product/</loc><lastmod>2025-01-08T22:12:25+00:00</lastmod></url><url><loc>https://computings.org/2025/01/08/dna-research-at-risk-thanks-to-bios-security-weaknesses/</loc><lastmod>2025-01-08T22:13:50+00:00</lastmod></url><url><loc>https://computings.org/2025/01/08/us-launches-cyber-trust-mark-for-iot-devices/</loc><lastmod>2025-01-08T22:14:02+00:00</lastmod></url><url><loc>https://computings.org/2025/01/08/cve-partnership-with-thales-group-as-a-designated-root-for-vulnerability-management/</loc><lastmod>2025-01-08T22:14:24+00:00</lastmod></url><url><loc>https://computings.org/2025/01/08/dell-update-package-framework-vulnerability-let-attackers-escalate-privileges/</loc><lastmod>2025-01-08T22:14:37+00:00</lastmod></url><url><loc>https://computings.org/2025/01/08/critical-mitel-oracle-flaws-find-active-exploitation-cisa-urges-patching/</loc><lastmod>2025-01-08T22:14:53+00:00</lastmod></url><url><loc>https://computings.org/2025/01/08/top-5-industries-most-vulnerable-to-cybercriminals-in-2025/</loc><lastmod>2025-01-08T22:15:15+00:00</lastmod></url><url><loc>https://computings.org/2025/01/08/chrome-type-confusion-vulnerability-let-attackers-execute-arbitrary-code-remotely/</loc><lastmod>2025-01-08T22:16:37+00:00</lastmod></url><url><loc>https://computings.org/2025/01/08/ivanti-warns-of-hackers-are-exploiting-new-vulnerability/</loc><lastmod>2025-01-08T22:16:54+00:00</lastmod></url><url><loc>https://computings.org/2025/01/08/technology-spotlight-on-industrial-cybersecurity/</loc><lastmod>2025-01-08T22:17:10+00:00</lastmod></url><url><loc>https://computings.org/2025/01/08/cisa-warns-of-mitel-micollab-vulnerabilities-exploited-in-attacks/</loc><lastmod>2025-01-08T22:17:21+00:00</lastmod></url><url><loc>https://computings.org/2025/01/08/ibm-concert-software-vulnerabilities-let-attackers-steal-sensitive-data/</loc><lastmod>2025-01-08T22:17:51+00:00</lastmod></url><url><loc>https://computings.org/2025/01/08/chrome-131-firefox-134-updates-patch-high-severity-vulnerabilities/</loc><lastmod>2025-01-08T22:18:10+00:00</lastmod></url><url><loc>https://computings.org/2025/01/08/mirai-botnet-variant-exploits-four-faith-router-vulnerability-for-ddos-attacks/</loc><lastmod>2025-01-08T22:18:25+00:00</lastmod></url><url><loc>https://computings.org/2025/01/08/first-android-update-of-2025-patches-critical-code-execution-vulnerabilities/</loc><lastmod>2025-01-08T22:19:07+00:00</lastmod></url><url><loc>https://computings.org/2025/01/08/critical-vulnerabilities-in-moxa-routers-allow-root-privilege-escalation/</loc><lastmod>2025-01-08T22:20:02+00:00</lastmod></url><url><loc>https://computings.org/2025/01/08/top-6-ways-to-back-your-business-up-with-cyber-threat-intelligence/</loc><lastmod>2025-01-08T22:20:41+00:00</lastmod></url><url><loc>https://computings.org/2025/01/08/php-servers-vulnerability-exploited-to-inject-packetcrypt-cryptocurrency-miner/</loc><lastmod>2025-01-08T22:22:05+00:00</lastmod></url><url><loc>https://computings.org/2025/01/08/e-commerce-faced-heightened-cybersecurity-threats-during-holiday-season/</loc><lastmod>2025-01-08T22:22:38+00:00</lastmod></url><url><loc>https://computings.org/2025/01/08/cisa-flags-critical-flaws-in-mitel-and-oracle-systems-amid-active-exploitation/</loc><lastmod>2025-01-08T22:23:03+00:00</lastmod></url><url><loc>https://computings.org/2025/01/08/cybersecurity-jobs-available-right-now-january-8-2025/</loc><lastmod>2025-01-08T22:23:17+00:00</lastmod></url><url><loc>https://computings.org/2025/01/08/cisa-adds-2020-oracle-vulnerability-to-kev-we-hope-you/</loc><lastmod>2025-01-08T22:23:31+00:00</lastmod></url><url><loc>https://computings.org/2025/01/08/mazda-connect-systems-vulnerable-to-cyber-attacks/</loc><lastmod>2025-01-08T22:23:47+00:00</lastmod></url><url><loc>https://computings.org/2025/01/08/security-risk-advisors-joins-the-microsoft-intelligent-security-association/</loc><lastmod>2025-01-08T22:24:00+00:00</lastmod></url><url><loc>https://computings.org/2025/01/08/krebs-on-security/</loc><lastmod>2025-01-08T22:24:31+00:00</lastmod></url><url><loc>https://computings.org/2025/01/10/linux-foundation-forms-new-initiative-to-support-development-of-chromium-based-projects/</loc><lastmod>2025-01-10T23:08:22+00:00</lastmod></url><url><loc>https://computings.org/2025/01/10/linux-foundation-launches-initiative-to-support-chromium-based-browsers/</loc><lastmod>2025-01-10T23:08:43+00:00</lastmod></url><url><loc>https://computings.org/2025/01/10/google-microsoft-and-others-team-up-for-chromium-browser-alliance-under-linux-foundation/</loc><lastmod>2025-01-10T23:09:11+00:00</lastmod></url><url><loc>https://computings.org/2025/01/10/linux-foundation-google-form-new-group-to-manage-chromium/</loc><lastmod>2025-01-10T23:09:26+00:00</lastmod></url><url><loc>https://computings.org/2025/01/10/a-new-initiative-will-fund-and-support-open-source-chromium-projects/</loc><lastmod>2025-01-10T23:09:43+00:00</lastmod></url><url><loc>https://computings.org/2025/01/10/linux-foundation-launches-initiative-to-support-chromium-browsers/</loc><lastmod>2025-01-10T23:09:57+00:00</lastmod></url><url><loc>https://computings.org/2025/01/10/google-and-linux-foundation-launch-initiative-to-support-chromium-ecosystem/</loc><lastmod>2025-01-10T23:12:25+00:00</lastmod></url><url><loc>https://computings.org/2025/01/10/linux-foundation-brings-together-top-browser-makers-for-more-open-approach/</loc><lastmod>2025-01-10T23:12:39+00:00</lastmod></url><url><loc>https://computings.org/2025/01/10/linux-foundation-brings-together-top-browser-makers-for-more-open-approach-2/</loc><lastmod>2025-01-10T23:12:54+00:00</lastmod></url><url><loc>https://computings.org/2025/01/10/linux-foundation-launches-chromium-initiative-to-support-innovation/</loc><lastmod>2025-01-10T23:13:23+00:00</lastmod></url><url><loc>https://computings.org/2025/01/10/google-and-the-linux-foundation-team-up-for-supporters-of-chromium-based-browsers/</loc><lastmod>2025-01-10T23:13:36+00:00</lastmod></url><url><loc>https://computings.org/2025/01/10/google-lets-chromium-run-free-with-linux-foundations-help/</loc><lastmod>2025-01-10T23:13:59+00:00</lastmod></url><url><loc>https://computings.org/2025/01/10/the-linux-foundation-announces-the-supporters-of-chromium-based-browsers/</loc><lastmod>2025-01-10T23:14:10+00:00</lastmod></url><url><loc>https://computings.org/2025/01/10/linux-foundation-launches-supporters-of-chromium-based-browsers-for-open-development/</loc><lastmod>2025-01-10T23:14:20+00:00</lastmod></url><url><loc>https://computings.org/2025/01/10/google-and-the-linux-foundation-establish-supporters-of-chromium-based-browsers-fund-to-support-the-development-and-maintenance-of-chromium-with-participation-from-meta-microsoft-and-others/</loc><lastmod>2025-01-10T23:14:40+00:00</lastmod></url><url><loc>https://computings.org/2025/01/10/google-just-partnered-with-the-linux-foundation-to-boost-open-source-chromium-development/</loc><lastmod>2025-01-10T23:15:28+00:00</lastmod></url><url><loc>https://computings.org/2025/01/10/linux-foundation-bands-together-chromium-browser-makers-in-a-neutral-space/</loc><lastmod>2025-01-10T23:15:43+00:00</lastmod></url><url><loc>https://computings.org/2025/01/10/google-meta-microsoft-and-opera-agree-on-something-supporting-chromium/</loc><lastmod>2025-01-10T23:15:56+00:00</lastmod></url><url><loc>https://computings.org/2025/01/10/linux-foundation-announces-the-launch-of-supporters-of-chromium-based-browsers/</loc><lastmod>2025-01-10T23:16:08+00:00</lastmod></url><url><loc>https://computings.org/2025/01/10/linux-foundation-announces-the-launch-of-supporters-of-chromium-based-browsers-2/</loc><lastmod>2025-01-10T23:16:29+00:00</lastmod></url><url><loc>https://computings.org/2025/01/10/linux-foundation-announces-the-launch-of-supporters-of-chromium-based-browsers-3/</loc><lastmod>2025-01-10T23:16:46+00:00</lastmod></url><url><loc>https://computings.org/2025/01/10/the-linux-foundation-launches-an-initiative-to-support-open-source-chromium-based-browsers/</loc><lastmod>2025-01-10T23:16:58+00:00</lastmod></url><url><loc>https://computings.org/2025/01/10/linux-foundation-launches-supporters-of-chromium-based-browsers-initiative-with-backing-from-google-microsoft-meta-and-opera/</loc><lastmod>2025-01-10T23:17:12+00:00</lastmod></url><url><loc>https://computings.org/2025/01/10/to-save-the-energy-grid-from-ai-use-open-source-ai-software/</loc><lastmod>2025-01-10T23:18:41+00:00</lastmod></url><url><loc>https://computings.org/2025/01/10/google-linux-foundation-launch-supporters-of-chromium-based-browsers-fund/</loc><lastmod>2025-01-10T23:18:51+00:00</lastmod></url><url><loc>https://computings.org/2025/01/10/webassembly-and-containers-love-affair-on-kubernetes/</loc><lastmod>2025-01-10T23:19:38+00:00</lastmod></url><url><loc>https://computings.org/2025/01/10/the-kubernetes-book-2nd-edition-worth-39-99-free-to-download/</loc><lastmod>2025-01-10T23:19:50+00:00</lastmod></url><url><loc>https://computings.org/2025/01/10/proton-worldwide-outage-caused-by-kubernetes-migration-software-change/</loc><lastmod>2025-01-10T23:20:07+00:00</lastmod></url><url><loc>https://computings.org/2025/01/10/wartime-footing-horizon3-lifts-dawn-on-nodezero-kubernetes-pentesting/</loc><lastmod>2025-01-10T23:23:06+00:00</lastmod></url><url><loc>https://computings.org/2025/01/10/minio-allies-with-f5-to-optimize-ai-workloads-deployed-on-kubernetes-clusters/</loc><lastmod>2025-01-10T23:23:21+00:00</lastmod></url><url><loc>https://computings.org/2025/01/10/securing-ai-workloads-in-multi-tenant-k8s-clusters/</loc><lastmod>2025-01-10T23:23:40+00:00</lastmod></url><url><loc>https://computings.org/2025/01/10/6-kubernetes-security-vendors-in-2025/</loc><lastmod>2025-01-10T23:23:56+00:00</lastmod></url><url><loc>https://computings.org/2025/01/10/chinas-unc5337-exploits-a-critical-ivanti-rce-bug-again/</loc><lastmod>2025-01-10T23:24:11+00:00</lastmod></url><url><loc>https://computings.org/2025/01/10/cisa-report-touts-cyber-hygiene-enrollment-surge-for-critical-infrastructure-orgs/</loc><lastmod>2025-01-10T23:24:25+00:00</lastmod></url><url><loc>https://computings.org/2025/01/10/ivanti-urges-patch-for-flaws-in-connect-secure-policy-secure-and-zta-gateways/</loc><lastmod>2025-01-10T23:24:36+00:00</lastmod></url><url><loc>https://computings.org/2025/01/10/in-other-news-bank-of-america-warns-of-data-breach-trucking-cybersecurity-treasury-hack-linked-to-silk-typhoon/</loc><lastmod>2025-01-10T23:27:21+00:00</lastmod></url><url><loc>https://computings.org/2025/01/10/samsung-patches-multiple-vulnerabilities-that-let-attackers-execute-arbitrary-code/</loc><lastmod>2025-01-10T23:27:43+00:00</lastmod></url><url><loc>https://computings.org/2025/01/10/microsoft-drm-hacking-raises-questions-on-vulnerability-disclosures/</loc><lastmod>2025-01-10T23:27:57+00:00</lastmod></url><url><loc>https://computings.org/2025/01/10/google-project-zero-researcher-uncovers-zero-click-exploit-targeting-samsung-devices/</loc><lastmod>2025-01-10T23:28:15+00:00</lastmod></url><url><loc>https://computings.org/2025/01/10/mandiant-latest-ivanti-vulns-exploited-by-chinese-cyber-spooks/</loc><lastmod>2025-01-10T23:28:25+00:00</lastmod></url><url><loc>https://computings.org/2025/01/10/robot-vacuums-hacked-to-spy-on-their-owners/</loc><lastmod>2025-01-10T23:28:40+00:00</lastmod></url><url><loc>https://computings.org/2025/01/10/weaponized-ldap-poc-exploit-installing-information-stealing-malware/</loc><lastmod>2025-01-10T23:29:00+00:00</lastmod></url><url><loc>https://computings.org/2025/01/10/alert-of-buffer-overflow-vulnerabilities-in-multiple-ivanti-products-cve-2025-0282/</loc><lastmod>2025-01-10T23:29:13+00:00</lastmod></url><url><loc>https://computings.org/2025/01/10/mandiant-releases-new-details-regarding-ivanti-zero-day-vulnerability-australian-cyber-security-magazine/</loc><lastmod>2025-01-10T23:30:42+00:00</lastmod></url><url><loc>https://computings.org/2025/01/10/becrypt-launches-vdi-guard-securing-critical-infrastructure-by-mitigating-remote-access-protocol-vulnerabilities/</loc><lastmod>2025-01-10T23:31:01+00:00</lastmod></url><url><loc>https://computings.org/2025/01/10/ivanti-discloses-critical-vpn-vulnerability-being-actively-targeted-by-hackers/</loc><lastmod>2025-01-10T23:31:15+00:00</lastmod></url><url><loc>https://computings.org/2025/01/10/bidens-final-cyber-order-tackles-digital-weaknesses/</loc><lastmod>2025-01-10T23:31:36+00:00</lastmod></url><url><loc>https://computings.org/2025/01/10/chinese-linked-hackers-may-be-exploiting-latest-ivanti-vulnerability/</loc><lastmod>2025-01-10T23:31:48+00:00</lastmod></url><url><loc>https://computings.org/2025/01/10/major-vulnerabilities-patched-in-sonicwall-palo-alto-expedition-and-aviatrix-controllers/</loc><lastmod>2025-01-10T23:32:04+00:00</lastmod></url><url><loc>https://computings.org/2025/01/10/new-zero-day-exploit-targets-ivanti-vpn-product/</loc><lastmod>2025-01-10T23:32:18+00:00</lastmod></url><url><loc>https://computings.org/2025/01/10/ivanti-patches-actively-exploited-zero-day/</loc><lastmod>2025-01-10T23:32:33+00:00</lastmod></url><url><loc>https://computings.org/2025/01/10/sonicwall-firewall-hit-with-critical-authentication-bypass-vulnerability/</loc><lastmod>2025-01-10T23:32:51+00:00</lastmod></url><url><loc>https://computings.org/2025/01/10/kerio-control-firewall-vulnerability-allows-1-click-remote-code-execution/</loc><lastmod>2025-01-10T23:33:12+00:00</lastmod></url><url><loc>https://computings.org/2025/01/10/hackers-are-exploiting-a-new-ivanti-vpn-security-bug-to-hack-into-company-networks/</loc><lastmod>2025-01-10T23:34:35+00:00</lastmod></url><url><loc>https://computings.org/2025/01/10/palo-alto-networks-patches-high-severity-vulnerability-in-retired-migration-tool/</loc><lastmod>2025-01-10T23:34:48+00:00</lastmod></url><url><loc>https://computings.org/2025/01/10/exploitation-of-new-ivanti-vpn-zero-day-linked-to-chinese-cyberspies/</loc><lastmod>2025-01-10T23:36:11+00:00</lastmod></url></urlset>
