<?xml version="1.0" encoding="UTF-8"?>
<?xml-stylesheet type="text/xsl" href="/wp-content/plugins/xml-sitemap-feed/assets/sitemap-news.xsl?ver=5.4.9"?>
<!-- generated-on="2026-04-30T15:00:54+00:00" -->
<!-- generator="XML Sitemap & Google News for WordPress" -->
<!-- generator-url="https://status301.net/wordpress-plugins/xml-sitemap-feed/" -->
<!-- generator-version="5.4.9" -->
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:news="http://www.google.com/schemas/sitemap-news/0.9" >
<url><loc>https://www.illicit-trade.com/demanteler-la-confiance-implicite-dans-les-reseaux-ot-dit-la-cisa-aux-operateurs-dinfrastructures-critiques/</loc><news:news><news:publication><news:name>Illicit Trade FR</news:name><news:language>fr</news:language></news:publication><news:publication_date>2026-04-30T14:23:58+02:00</news:publication_date><news:title>Démanteler la confiance implicite dans les réseaux OT, dit la CISA aux opérateurs d’infrastructures critiques</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://www.illicit-trade.com/des-chercheurs-decouvrent-un-malware-de-sabotage-industriel-qui-a-precede-stuxnet-de-5-ans/</loc><news:news><news:publication><news:name>Illicit Trade FR</news:name><news:language>fr</news:language></news:publication><news:publication_date>2026-04-30T08:24:10+02:00</news:publication_date><news:title>Des chercheurs découvrent un malware de sabotage industriel qui a précédé Stuxnet de 5 ans</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://www.illicit-trade.com/handalas-shift-et-ashab-al-yamin-sur-telegram/</loc><news:news><news:publication><news:name>Illicit Trade FR</news:name><news:language>fr</news:language></news:publication><news:publication_date>2026-04-30T04:23:52+02:00</news:publication_date><news:title>Handala’s Shift et Ashab al-Yamin sur Telegram</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://www.illicit-trade.com/stopper-les-attaques-aitm-les-defenses-qui-fonctionnent-reellement-une-fois-lauthentification-reussie/</loc><news:news><news:publication><news:name>Illicit Trade FR</news:name><news:language>fr</news:language></news:publication><news:publication_date>2026-04-30T02:23:53+02:00</news:publication_date><news:title>Stopper les attaques AiTM : les défenses qui fonctionnent réellement une fois l’authentification réussie</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://www.illicit-trade.com/aws-sappuie-sur-son-ingeniosite-anterieure-pour-faire-face-aux-futures-menaces-ia-et-quantiques/</loc><news:news><news:publication><news:name>Illicit Trade FR</news:name><news:language>fr</news:language></news:publication><news:publication_date>2026-04-29T20:23:39+02:00</news:publication_date><news:title>AWS s’appuie sur son ingéniosité antérieure pour faire face aux futures menaces IA et quantiques</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://www.illicit-trade.com/un-bug-critique-de-github-rce-a-expose-des-millions-de-referentiels/</loc><news:news><news:publication><news:name>Illicit Trade FR</news:name><news:language>fr</news:language></news:publication><news:publication_date>2026-04-29T14:23:40+02:00</news:publication_date><news:title>Un bug critique de GitHub RCE a exposé des millions de référentiels</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://www.illicit-trade.com/plus-de-fausses-extensions-liees-a-glassworm-trouvees-sur-le-marche-du-code-open-vsx/</loc><news:news><news:publication><news:name>Illicit Trade FR</news:name><news:language>fr</news:language></news:publication><news:publication_date>2026-04-29T08:23:43+02:00</news:publication_date><news:title>Plus de fausses extensions liées à GlassWorm trouvées sur le marché du code Open VSX</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://www.illicit-trade.com/ce-que-les-rssi-doivent-faire-a-lheure-ou-lidentite-entre-dans-lere-agentique/</loc><news:news><news:publication><news:name>Illicit Trade FR</news:name><news:language>fr</news:language></news:publication><news:publication_date>2026-04-29T02:23:39+02:00</news:publication_date><news:title>Ce que les RSSI doivent faire à l’heure où l’identité entre dans l’ère agentique</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://www.illicit-trade.com/un-bug-critique-du-curseur-pourrait-transformer-la-routine-git-en-rce/</loc><news:news><news:publication><news:name>Illicit Trade FR</news:name><news:language>fr</news:language></news:publication><news:publication_date>2026-04-28T20:24:04+02:00</news:publication_date><news:title>Un bug critique du curseur pourrait transformer la routine Git en RCE</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
</urlset>
