<?xml version="1.0" encoding="UTF-8"?>
<?xml-stylesheet type="text/xsl" href="/wp-content/plugins/xml-sitemap-feed/assets/sitemap-news.xsl?ver=5.3.6"?>
<!-- generated-on="2026-05-01T20:00:45+00:00" -->
<!-- generator="XML Sitemap & Google News for WordPress" -->
<!-- generator-url="https://status301.net/wordpress-plugins/xml-sitemap-feed/" -->
<!-- generator-version="5.3.6" -->
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9"
	xmlns:news="http://www.google.com/schemas/sitemap-news/0.9">
	<url>
		<loc>https://www.techidee.nl/aan-china-gelinkte-hackers-richten-zich-op-aziatische-regeringen-navo-landen-journalisten-en-activisten/35185/</loc>
		<news:news>
			<news:publication>
				<news:name>Techidee.nl</news:name>
				<news:language>nl</news:language>
			</news:publication>
			<news:publication_date>2026-05-01T20:26:43+02:00</news:publication_date>
			<news:title>Aan China gelinkte hackers richten zich op Aziatische regeringen, NAVO-landen, journalisten en activisten</news:title>
			<news:keywords></news:keywords>
			<news:stock_tickers></news:stock_tickers>
		</news:news>
	</url>
	<url>
		<loc>https://www.techidee.nl/cybercriminaliteitsgroepen-gebruiken-vishing-en-sso-misbruik-bij-snelle-saas-afpersingsaanvallen/35182/</loc>
		<news:news>
			<news:publication>
				<news:name>Techidee.nl</news:name>
				<news:language>nl</news:language>
			</news:publication>
			<news:publication_date>2026-05-01T18:26:40+02:00</news:publication_date>
			<news:title>Cybercriminaliteitsgroepen gebruiken Vishing en SSO-misbruik bij snelle SaaS-afpersingsaanvallen</news:title>
			<news:keywords></news:keywords>
			<news:stock_tickers></news:stock_tickers>
		</news:news>
	</url>
	<url>
		<loc>https://www.techidee.nl/top-vijf-verkoopuitdagingen-die-msps-de-cybersecurity-inkomsten-kosten/35179/</loc>
		<news:news>
			<news:publication>
				<news:name>Techidee.nl</news:name>
				<news:language>nl</news:language>
			</news:publication>
			<news:publication_date>2026-05-01T14:26:43+02:00</news:publication_date>
			<news:title>Top vijf verkoopuitdagingen die MSP&#8217;s de cybersecurity-inkomsten kosten</news:title>
			<news:keywords></news:keywords>
			<news:stock_tickers></news:stock_tickers>
		</news:news>
	</url>
	<url>
		<loc>https://www.techidee.nl/vergiftigde-ruby-gems-en-go-modules-exploiteren-ci-pijpleidingen-voor-diefstal-van-inloggegevens/35176/</loc>
		<news:news>
			<news:publication>
				<news:name>Techidee.nl</news:name>
				<news:language>nl</news:language>
			</news:publication>
			<news:publication_date>2026-05-01T12:26:48+02:00</news:publication_date>
			<news:title>Vergiftigde Ruby Gems en Go-modules exploiteren CI-pijpleidingen voor diefstal van inloggegevens</news:title>
			<news:keywords></news:keywords>
			<news:stock_tickers></news:stock_tickers>
		</news:news>
	</url>
	<url>
		<loc>https://www.techidee.nl/pytorch-lightning-en-intercom-client-getroffen-door-supply-chain-aanvallen-om-inloggegevens-te-stelen/35170/</loc>
		<news:news>
			<news:publication>
				<news:name>Techidee.nl</news:name>
				<news:language>nl</news:language>
			</news:publication>
			<news:publication_date>2026-04-30T20:26:47+02:00</news:publication_date>
			<news:title>PyTorch Lightning en intercom-client getroffen door supply chain-aanvallen om inloggegevens te stelen</news:title>
			<news:keywords></news:keywords>
			<news:stock_tickers></news:stock_tickers>
		</news:news>
	</url>
	<url>
		<loc>https://www.techidee.nl/nieuwe-python-backdoor-gebruikt-tunnelingservice-om-browser-en-cloudreferenties-te-stelen/35167/</loc>
		<news:news>
			<news:publication>
				<news:name>Techidee.nl</news:name>
				<news:language>nl</news:language>
			</news:publication>
			<news:publication_date>2026-04-30T18:26:44+02:00</news:publication_date>
			<news:title>Nieuwe Python Backdoor gebruikt tunnelingservice om browser- en cloudreferenties te stelen</news:title>
			<news:keywords></news:keywords>
			<news:stock_tickers></news:stock_tickers>
		</news:news>
	</url>
</urlset>
