<?xml version="1.0" encoding="UTF-8"?>
<?xml-stylesheet type="text/xsl" href="/wp-content/plugins/xml-sitemap-feed/assets/sitemap-news.xsl?ver=5.4.9"?>
<!-- generated-on="2026-05-14T16:59:09+00:00" -->
<!-- generator="XML Sitemap & Google News for WordPress" -->
<!-- generator-url="https://status301.net/wordpress-plugins/xml-sitemap-feed/" -->
<!-- generator-version="5.4.9" -->
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:news="http://www.google.com/schemas/sitemap-news/0.9" >
<url><loc>https://www.illicit-trade.com/le-gang-de-phishing-flowerstorm-adopte-lobscurcissement-des-machines-virtuelles-pour-echapper-aux-defenses-de-la-messagerie-electronique/</loc><news:news><news:publication><news:name>Illicit Trade FR</news:name><news:language>fr</news:language></news:publication><news:publication_date>2026-05-14T17:58:24+02:00</news:publication_date><news:title>Le gang de phishing FlowerStorm adopte l’obscurcissement des machines virtuelles pour échapper aux défenses de la messagerie électronique</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://www.illicit-trade.com/histoires-reelles-dattaques-dextorsion-de-donnees/</loc><news:news><news:publication><news:name>Illicit Trade FR</news:name><news:language>fr</news:language></news:publication><news:publication_date>2026-05-14T13:00:01+02:00</news:publication_date><news:title>Histoires réelles d’attaques d’extorsion de données</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://www.illicit-trade.com/ce-dont-les-rssi-ont-besoin-pour-acceder-a-un-poste-au-conseil-dadministration/</loc><news:news><news:publication><news:name>Illicit Trade FR</news:name><news:language>fr</news:language></news:publication><news:publication_date>2026-05-14T12:57:54+02:00</news:publication_date><news:title>Ce dont les RSSI ont besoin pour accéder à un poste au conseil d’administration</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://www.illicit-trade.com/fortinet-corrige-deux-failles-rce-critiques-dans-fortiauthenticator-et-fortisandbox/</loc><news:news><news:publication><news:name>Illicit Trade FR</news:name><news:language>fr</news:language></news:publication><news:publication_date>2026-05-14T07:57:12+02:00</news:publication_date><news:title>Fortinet corrige deux failles RCE critiques dans FortiAuthenticator et FortiSandbox</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://www.illicit-trade.com/un-employe-licencie-a-demande-laide-de-lia-pour-masquer-la-suppression-des-donnees-clients-de-la-societe-dhebergement/</loc><news:news><news:publication><news:name>Illicit Trade FR</news:name><news:language>fr</news:language></news:publication><news:publication_date>2026-05-14T02:55:01+02:00</news:publication_date><news:title>Un employé licencié a demandé l’aide de l’IA pour masquer la suppression des données clients de la société d’hébergement</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://www.illicit-trade.com/le-nouveau-systeme-dia-de-microsoft-detecte-16-failles-windows-dont-quatre-rce-critiques/</loc><news:news><news:publication><news:name>Illicit Trade FR</news:name><news:language>fr</news:language></news:publication><news:publication_date>2026-05-13T21:53:30+02:00</news:publication_date><news:title>Le nouveau système d’IA de Microsoft détecte 16 failles Windows, dont quatre RCE critiques</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://www.illicit-trade.com/que-se-passera-t-il-lorsque-lia-chinoise-rattrapera-mythos/</loc><news:news><news:publication><news:name>Illicit Trade FR</news:name><news:language>fr</news:language></news:publication><news:publication_date>2026-05-13T16:52:09+02:00</news:publication_date><news:title>Que se passera-t-il lorsque l’IA chinoise rattrapera Mythos ?</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://www.illicit-trade.com/google-decouvre-dabord-lexploit-zero-day-base-sur-ki/</loc><news:news><news:publication><news:name>Illicit Trade FR</news:name><news:language>fr</news:language></news:publication><news:publication_date>2026-05-13T11:51:32+02:00</news:publication_date><news:title>Google découvre d’abord l’exploit Zero-Day basé sur KI</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://www.illicit-trade.com/fake-claude-code-amene-ielevator-aux-secrets-de-votre-navigateur/</loc><news:news><news:publication><news:name>Illicit Trade FR</news:name><news:language>fr</news:language></news:publication><news:publication_date>2026-05-13T01:49:52+02:00</news:publication_date><news:title>Fake Claude Code amène IElevator aux secrets de votre navigateur</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://www.illicit-trade.com/le-sdk-mistral-ai-et-le-routeur-tanstack-touches-par-une-attaque-contre-la-chaine-dapprovisionnement-du-logiciel-npm/</loc><news:news><news:publication><news:name>Illicit Trade FR</news:name><news:language>fr</news:language></news:publication><news:publication_date>2026-05-12T20:48:56+02:00</news:publication_date><news:title>Le SDK Mistral AI et le routeur TanStack touchés par une attaque contre la chaîne d’approvisionnement du logiciel NPM</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
</urlset>
