<?xml version="1.0" encoding="UTF-8"?>
<?xml-stylesheet type="text/xsl" href="/wp-content/plugins/xml-sitemap-feed/assets/sitemap-news.xsl?ver=5.3.6"?>
<!-- generated-on="2026-05-16T18:29:11+00:00" -->
<!-- generator="XML Sitemap & Google News for WordPress" -->
<!-- generator-url="https://status301.net/wordpress-plugins/xml-sitemap-feed/" -->
<!-- generator-version="5.3.6" -->
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9"
	xmlns:news="http://www.google.com/schemas/sitemap-news/0.9">
	<url>
		<loc>https://www.techidee.nl/funnel-builder-fout-onder-actieve-exploitatie-maakt-woocommerce-checkout-skimming-mogelijk/35394/</loc>
		<news:news>
			<news:publication>
				<news:name>Techidee.nl</news:name>
				<news:language>nl</news:language>
			</news:publication>
			<news:publication_date>2026-05-16T20:26:40+02:00</news:publication_date>
			<news:title>Funnel Builder-fout onder actieve exploitatie maakt WooCommerce Checkout-skimming mogelijk</news:title>
			<news:keywords></news:keywords>
			<news:stock_tickers></news:stock_tickers>
		</news:news>
	</url>
	<url>
		<loc>https://www.techidee.nl/turla-verandert-kazuar-backdoor-in-een-modulair-p2p-botnet-voor-permanente-toegang/35391/</loc>
		<news:news>
			<news:publication>
				<news:name>Techidee.nl</news:name>
				<news:language>nl</news:language>
			</news:publication>
			<news:publication_date>2026-05-15T20:26:52+02:00</news:publication_date>
			<news:title>Turla verandert Kazuar Backdoor in een modulair P2P-botnet voor permanente toegang</news:title>
			<news:keywords></news:keywords>
			<news:stock_tickers></news:stock_tickers>
		</news:news>
	</url>
	<url>
		<loc>https://www.techidee.nl/vier-openclaw-fouten-maken-gegevensdiefstal-escalatie-van-bevoegdheden-en-persistentie-mogelijk/35388/</loc>
		<news:news>
			<news:publication>
				<news:name>Techidee.nl</news:name>
				<news:language>nl</news:language>
			</news:publication>
			<news:publication_date>2026-05-15T18:27:02+02:00</news:publication_date>
			<news:title>Vier OpenClaw-fouten maken gegevensdiefstal, escalatie van bevoegdheden en persistentie mogelijk</news:title>
			<news:keywords></news:keywords>
			<news:stock_tickers></news:stock_tickers>
		</news:news>
	</url>
	<url>
		<loc>https://www.techidee.nl/tanstack-supply-chain-aanval-treft-twee-openai-werknemersapparaten-en-dwingt-macos-updates-af/35385/</loc>
		<news:news>
			<news:publication>
				<news:name>Techidee.nl</news:name>
				<news:language>nl</news:language>
			</news:publication>
			<news:publication_date>2026-05-15T16:27:12+02:00</news:publication_date>
			<news:title>TanStack Supply Chain-aanval treft twee OpenAI-werknemersapparaten en dwingt macOS-updates af</news:title>
			<news:keywords></news:keywords>
			<news:stock_tickers></news:stock_tickers>
		</news:news>
	</url>
	<url>
		<loc>https://www.techidee.nl/wat-45-dagen-kijken-naar-je-eigen-gereedschap-je-zal-vertellen-over-je-echte-aanvalsoppervlak/35382/</loc>
		<news:news>
			<news:publication>
				<news:name>Techidee.nl</news:name>
				<news:language>nl</news:language>
			</news:publication>
			<news:publication_date>2026-05-15T14:27:41+02:00</news:publication_date>
			<news:title>Wat 45 dagen kijken naar je eigen gereedschap je zal vertellen over je echte aanvalsoppervlak</news:title>
			<news:keywords></news:keywords>
			<news:stock_tickers></news:stock_tickers>
		</news:news>
	</url>
	<url>
		<loc>https://www.techidee.nl/lokale-microsoft-exchange-server-cve-2026-42897-benut-via-vervaardigde-e-mail/35379/</loc>
		<news:news>
			<news:publication>
				<news:name>Techidee.nl</news:name>
				<news:language>nl</news:language>
			</news:publication>
			<news:publication_date>2026-05-15T10:26:44+02:00</news:publication_date>
			<news:title>Lokale Microsoft Exchange Server CVE-2026-42897 benut via vervaardigde e-mail</news:title>
			<news:keywords></news:keywords>
			<news:stock_tickers></news:stock_tickers>
		</news:news>
	</url>
	<url>
		<loc>https://www.techidee.nl/cisa-voegt-cisco-sd-wan-cve-2026-20182-toe-aan-kev-na-misbruik-van-beheerderstoegang/35376/</loc>
		<news:news>
			<news:publication>
				<news:name>Techidee.nl</news:name>
				<news:language>nl</news:language>
			</news:publication>
			<news:publication_date>2026-05-15T08:27:16+02:00</news:publication_date>
			<news:title>CISA voegt Cisco SD-WAN CVE-2026-20182 toe aan KEV na misbruik van beheerderstoegang</news:title>
			<news:keywords></news:keywords>
			<news:stock_tickers></news:stock_tickers>
		</news:news>
	</url>
	<url>
		<loc>https://www.techidee.nl/hoe-ai-hallucinaties-echte-veiligheidsrisicos-veroorzaken/35373/</loc>
		<news:news>
			<news:publication>
				<news:name>Techidee.nl</news:name>
				<news:language>nl</news:language>
			</news:publication>
			<news:publication_date>2026-05-15T01:26:44+02:00</news:publication_date>
			<news:title>Hoe AI-hallucinaties echte veiligheidsrisico&#8217;s veroorzaken</news:title>
			<news:keywords></news:keywords>
			<news:stock_tickers></news:stock_tickers>
		</news:news>
	</url>
	<url>
		<loc>https://www.techidee.nl/stealer-backdoor-gevonden-in-3-node-ipc-versies-gericht-op-ontwikkelaarsgeheimen/35370/</loc>
		<news:news>
			<news:publication>
				<news:name>Techidee.nl</news:name>
				<news:language>nl</news:language>
			</news:publication>
			<news:publication_date>2026-05-14T23:26:42+02:00</news:publication_date>
			<news:title>Stealer Backdoor gevonden in 3 Node-IPC-versies gericht op ontwikkelaarsgeheimen</news:title>
			<news:keywords></news:keywords>
			<news:stock_tickers></news:stock_tickers>
		</news:news>
	</url>
	<url>
		<loc>https://www.techidee.nl/cisco-catalyst-sd-wan-controller-auth-bypass-wordt-actief-benut-om-beheerderstoegang-te-verkrijgen/35367/</loc>
		<news:news>
			<news:publication>
				<news:name>Techidee.nl</news:name>
				<news:language>nl</news:language>
			</news:publication>
			<news:publication_date>2026-05-14T21:26:43+02:00</news:publication_date>
			<news:title>Cisco Catalyst SD-WAN Controller Auth Bypass wordt actief benut om beheerderstoegang te verkrijgen</news:title>
			<news:keywords></news:keywords>
			<news:stock_tickers></news:stock_tickers>
		</news:news>
	</url>
</urlset>
