<?xml version="1.0" encoding="UTF-8"?>
<?xml-stylesheet type="text/xsl" href="https://blog.iberiaintel.com/wp-content/plugins/wpseo-news/assets/xml-news-sitemap.xsl"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:news="http://www.google.com/schemas/sitemap-news/0.9">
<url>
	<loc>https://blog.iberiaintel.com/cve-2026-0740-sistemas-afectados-como-parchear/</loc>
	<news:news>
		<news:publication>
			<news:name>Iberia Intel</news:name>
			<news:language>es</news:language>
		</news:publication>
		<news:publication_date>2026-04-07T08:26:01+00:00</news:publication_date>
		<news:title><![CDATA[CVE-2026-0740: qué sistemas afecta y cómo parchear]]></news:title>
	</news:news>
</url>
<url>
	<loc>https://blog.iberiaintel.com/los-5-errores-que-bloquean-la-seguridad-al-pasar-de-proyecto-a-proceso/</loc>
	<news:news>
		<news:publication>
			<news:name>Iberia Intel</news:name>
			<news:language>es</news:language>
		</news:publication>
		<news:publication_date>2026-04-07T08:23:38+00:00</news:publication_date>
		<news:title><![CDATA[Los 5 errores que bloquean la seguridad al pasar de proyecto a proceso]]></news:title>
	</news:news>
</url>
<url>
	<loc>https://blog.iberiaintel.com/vulnerabilidades-roundcube-que-sistemas-afectan-como-parchearlas/</loc>
	<news:news>
		<news:publication>
			<news:name>Iberia Intel</news:name>
			<news:language>es</news:language>
		</news:publication>
		<news:publication_date>2026-04-07T05:49:12+00:00</news:publication_date>
		<news:title><![CDATA[Vulnerabilidades en Roundcube: qué sistemas afectan y cómo parchearlas]]></news:title>
	</news:news>
</url>
<url>
	<loc>https://blog.iberiaintel.com/cve-2026-35471-que-sistemas-afecta-y-como-parchear/</loc>
	<news:news>
		<news:publication>
			<news:name>Iberia Intel</news:name>
			<news:language>es</news:language>
		</news:publication>
		<news:publication_date>2026-04-07T03:16:34+00:00</news:publication_date>
		<news:title><![CDATA[CVE-2026-35471: qué sistemas afecta y cómo parchear]]></news:title>
	</news:news>
</url>
<url>
	<loc>https://blog.iberiaintel.com/ataque-axios-npm-revela-industrializacion-ingenieria-social-compleja/</loc>
	<news:news>
		<news:publication>
			<news:name>Iberia Intel</news:name>
			<news:language>es</news:language>
		</news:publication>
		<news:publication_date>2026-04-07T03:14:19+00:00</news:publication_date>
		<news:title><![CDATA[El ataque a Axios npm revela la industrialización de la ingeniería social compleja]]></news:title>
	</news:news>
</url>
<url>
	<loc>https://blog.iberiaintel.com/cve-2025-54328-que-sistemas-afecta-y-como-parchear/</loc>
	<news:news>
		<news:publication>
			<news:name>Iberia Intel</news:name>
			<news:language>es</news:language>
		</news:publication>
		<news:publication_date>2026-04-07T00:42:08+00:00</news:publication_date>
		<news:title><![CDATA[CVE-2025-54328: qué sistemas afecta y cómo parchear]]></news:title>
	</news:news>
</url>
<url>
	<loc>https://blog.iberiaintel.com/lideres-ransomware-revil-gandcrab-identificados-alemania/</loc>
	<news:news>
		<news:publication>
			<news:name>Iberia Intel</news:name>
			<news:language>es</news:language>
		</news:publication>
		<news:publication_date>2026-04-07T00:39:28+00:00</news:publication_date>
		<news:title><![CDATA[Quiénes son los líderes de REvil y GandCrab identificados por las autoridades alemanas]]></news:title>
	</news:news>
</url>
<url>
	<loc>https://blog.iberiaintel.com/guia-definitiva-n8n-zapier-make-plataforma-automatizacion-elegir-2026/</loc>
	<news:news>
		<news:publication>
			<news:name>Iberia Intel</news:name>
			<news:language>es</news:language>
		</news:publication>
		<news:publication_date>2026-04-06T22:08:14+00:00</news:publication_date>
		<news:title><![CDATA[Guía definitiva: n8n vs Zapier vs Make, ¿qué plataforma de automatización elegir en 2026?]]></news:title>
	</news:news>
</url>
<url>
	<loc>https://blog.iberiaintel.com/ataque-cadena-suministro-ia-github/</loc>
	<news:news>
		<news:publication>
			<news:name>Iberia Intel</news:name>
			<news:language>es</news:language>
		</news:publication>
		<news:publication_date>2026-04-06T22:03:40+00:00</news:publication_date>
		<news:title><![CDATA[Ataque de cadena de suministro con IA en GitHub: cómo funciona y cómo protegerse]]></news:title>
	</news:news>
</url>
<url>
	<loc>https://blog.iberiaintel.com/ataque-gpubreach-rowhammer-gpu-compromiso-sistema/</loc>
	<news:news>
		<news:publication>
			<news:name>Iberia Intel</news:name>
			<news:language>es</news:language>
		</news:publication>
		<news:publication_date>2026-04-06T21:58:01+00:00</news:publication_date>
		<news:title><![CDATA[Ataque GPUBreach: qué es el rowhammer en GPU y cómo compromete el sistema]]></news:title>
	</news:news>
</url>
<url>
	<loc>https://blog.iberiaintel.com/cve-2026-34950-que-sistemas-afecta-y-como-parchear/</loc>
	<news:news>
		<news:publication>
			<news:name>Iberia Intel</news:name>
			<news:language>es</news:language>
		</news:publication>
		<news:publication_date>2026-04-06T21:01:38+00:00</news:publication_date>
		<news:title><![CDATA[CVE-2026-34950: qué sistemas afecta y cómo parchear]]></news:title>
	</news:news>
</url>
<url>
	<loc>https://blog.iberiaintel.com/vulnerabilidad-trueconf-actualizacion-malware-gubernamental/</loc>
	<news:news>
		<news:publication>
			<news:name>Iberia Intel</news:name>
			<news:language>es</news:language>
		</news:publication>
		<news:publication_date>2026-04-06T20:59:05+00:00</news:publication_date>
		<news:title><![CDATA[Vulnerabilidad TrueConf: cómo la actualización legítima distribuía malware gubernamental]]></news:title>
	</news:news>
</url>
<url>
	<loc>https://blog.iberiaintel.com/cve-2026-35022-que-sistemas-afecta-y-como-parchear/</loc>
	<news:news>
		<news:publication>
			<news:name>Iberia Intel</news:name>
			<news:language>es</news:language>
		</news:publication>
		<news:publication_date>2026-04-06T20:55:31+00:00</news:publication_date>
		<news:title><![CDATA[CVE-2026-35022: qué sistemas afecta y cómo parchear]]></news:title>
	</news:news>
</url>
<url>
	<loc>https://blog.iberiaintel.com/zero-day-windows-escalada-privilegios-bluehammer/</loc>
	<news:news>
		<news:publication>
			<news:name>Iberia Intel</news:name>
			<news:language>es</news:language>
		</news:publication>
		<news:publication_date>2026-04-06T20:53:11+00:00</news:publication_date>
		<news:title><![CDATA[Zero-day en Windows permite escalada de privilegios: qué sistemas afecta y cómo protegerse]]></news:title>
	</news:news>
</url>
<url>
	<loc>https://blog.iberiaintel.com/cve-2026-35171-que-sistemas-afecta-y-como-parchear/</loc>
	<news:news>
		<news:publication>
			<news:name>Iberia Intel</news:name>
			<news:language>es</news:language>
		</news:publication>
		<news:publication_date>2026-04-06T20:43:37+00:00</news:publication_date>
		<news:title><![CDATA[CVE-2026-35171: qué sistemas afecta y cómo parchear]]></news:title>
	</news:news>
</url>
<url>
	<loc>https://blog.iberiaintel.com/ataques-ransomware-medusa-dia-cero-impactan-sectores-criticos/</loc>
	<news:news>
		<news:publication>
			<news:name>Iberia Intel</news:name>
			<news:language>es</news:language>
		</news:publication>
		<news:publication_date>2026-04-06T20:41:11+00:00</news:publication_date>
		<news:title><![CDATA[Ataques ransomware Medusa día cero impactan a sectores críticos]]></news:title>
	</news:news>
</url>
<url>
	<loc>https://blog.iberiaintel.com/cve-2026-34841-que-sistemas-afecta-y-como-parchear/</loc>
	<news:news>
		<news:publication>
			<news:name>Iberia Intel</news:name>
			<news:language>es</news:language>
		</news:publication>
		<news:publication_date>2026-04-06T20:38:29+00:00</news:publication_date>
		<news:title><![CDATA[CVE-2026-34841: qué sistemas afecta y cómo parchear]]></news:title>
	</news:news>
</url>
<url>
	<loc>https://blog.iberiaintel.com/cve-2026-34976-vulnerabilidad-critica-en-dgraph-permite-acceso-no-autententicado-y-toma-de-control/</loc>
	<news:news>
		<news:publication>
			<news:name>Iberia Intel</news:name>
			<news:language>es</news:language>
		</news:publication>
		<news:publication_date>2026-04-06T20:33:41+00:00</news:publication_date>
		<news:title><![CDATA[CVE-2026-34976: Vulnerabilidad crítica en Dgraph permite acceso no autenticado y toma de control]]></news:title>
	</news:news>
</url>
<url>
	<loc>https://blog.iberiaintel.com/informe-fbi-2025-fraude-cibernetico-perdidas-record-17600-millones/</loc>
	<news:news>
		<news:publication>
			<news:name>Iberia Intel</news:name>
			<news:language>es</news:language>
		</news:publication>
		<news:publication_date>2026-04-06T20:31:49+00:00</news:publication_date>
		<news:title><![CDATA[Informe FBI 2025: el fraude cibernético alcanza pérdidas récord de 17.600 millones de dólares]]></news:title>
	</news:news>
</url>
<url>
	<loc>https://blog.iberiaintel.com/policia-alemana-identifica-sospechosos-revil-gandcrab/</loc>
	<news:news>
		<news:publication>
			<news:name>Iberia Intel</news:name>
			<news:language>es</news:language>
		</news:publication>
		<news:publication_date>2026-04-06T20:28:55+00:00</news:publication_date>
		<news:title><![CDATA[Cómo la policía alemana identificó a dos sospechosos clave de las bandas de ransomware REvil y GandCrab]]></news:title>
	</news:news>
</url>
<url>
	<loc>https://blog.iberiaintel.com/campana-password-spraying-irani-afecta-organizaciones-israelies-microsoft-365/</loc>
	<news:news>
		<news:publication>
			<news:name>Iberia Intel</news:name>
			<news:language>es</news:language>
		</news:publication>
		<news:publication_date>2026-04-06T20:27:30+00:00</news:publication_date>
		<news:title><![CDATA[Campaña de password-spraying iraní afecta a más de 300 organizaciones israelíes de Microsoft 365]]></news:title>
	</news:news>
</url>
<url>
	<loc>https://blog.iberiaintel.com/sentencia-nuevo-mexico-meta-cifrado-extremo-extremo/</loc>
	<news:news>
		<news:publication>
			<news:name>Iberia Intel</news:name>
			<news:language>es</news:language>
		</news:publication>
		<news:publication_date>2026-04-06T20:25:28+00:00</news:publication_date>
		<news:title><![CDATA[Qué implica la sentencia de Nuevo México contra Meta para el cifrado de extremo a extremo]]></news:title>
	</news:news>
</url>
<url>
	<loc>https://blog.iberiaintel.com/bluehammer-exploit-windows-zero-day-filtrado/</loc>
	<news:news>
		<news:publication>
			<news:name>Iberia Intel</news:name>
			<news:language>es</news:language>
		</news:publication>
		<news:publication_date>2026-04-06T20:24:01+00:00</news:publication_date>
		<news:title><![CDATA[BlueHammer: el exploit de Windows zero-day filtrado por un investigador descontento]]></news:title>
	</news:news>
</url>
<url>
	<loc>https://blog.iberiaintel.com/cve-2026-34208-vulnerabilidad-critica-sandboxjs-escape-sandbox/</loc>
	<news:news>
		<news:publication>
			<news:name>Iberia Intel</news:name>
			<news:language>es</news:language>
		</news:publication>
		<news:publication_date>2026-04-06T20:22:26+00:00</news:publication_date>
		<news:title><![CDATA[CVE-2026-34208: Vulnerabilidad crítica en SandboxJS permite escape de sandbox]]></news:title>
	</news:news>
</url>
<url>
	<loc>https://blog.iberiaintel.com/ransomware-medusa-zero-day-ataques-24-horas/</loc>
	<news:news>
		<news:publication>
			<news:name>Iberia Intel</news:name>
			<news:language>es</news:language>
		</news:publication>
		<news:publication_date>2026-04-06T20:22:14+00:00</news:publication_date>
		<news:title><![CDATA[Cómo el ransomware Medusa usa zero-days para atacar en menos de 24 horas, según Microsoft]]></news:title>
	</news:news>
</url>
<url>
	<loc>https://blog.iberiaintel.com/ataques-dprk-phishing-lnk-github-c2/</loc>
	<news:news>
		<news:publication>
			<news:name>Iberia Intel</news:name>
			<news:language>es</news:language>
		</news:publication>
		<news:publication_date>2026-04-06T20:08:09+00:00</news:publication_date>
		<news:title><![CDATA[Ataques DPRK con phishing LNK y GitHub C2: cómo funcionan y cómo protegerse]]></news:title>
	</news:news>
</url>
<url>
	<loc>https://blog.iberiaintel.com/estafas-multas-trafico-codigos-qr-phishing/</loc>
	<news:news>
		<news:publication>
			<news:name>Iberia Intel</news:name>
			<news:language>es</news:language>
		</news:publication>
		<news:publication_date>2026-04-05T23:05:28+00:00</news:publication_date>
		<news:title><![CDATA[Cómo funcionan las estafas de multas de tráfico con códigos QR y cómo evitarlas]]></news:title>
	</news:news>
</url>
<url>
	<loc>https://blog.iberiaintel.com/cve-2026-5577-vulnerabilidad-inyeccion-sql-song-li-cross-browser/</loc>
	<news:news>
		<news:publication>
			<news:name>Iberia Intel</news:name>
			<news:language>es</news:language>
		</news:publication>
		<news:publication_date>2026-04-05T16:18:47+00:00</news:publication_date>
		<news:title><![CDATA[CVE-2026-5577: Vulnerabilidad de inyección SQL crítica en Song-Li cross_browser]]></news:title>
	</news:news>
</url>
<url>
	<loc>https://blog.iberiaintel.com/t2sec-logra-100-especializaciones-palo-alto-networks/</loc>
	<news:news>
		<news:publication>
			<news:name>Iberia Intel</news:name>
			<news:language>es</news:language>
		</news:publication>
		<news:publication_date>2026-04-05T15:58:58+00:00</news:publication_date>
		<news:title><![CDATA[T2Sec logra el 100% de las especializaciones de Palo Alto Networks: qué significa para el sector]]></news:title>
	</news:news>
</url>
<url>
	<loc>https://blog.iberiaintel.com/amenazas-malware-2026-evasion-ia-ataques-cadena-suministro/</loc>
	<news:news>
		<news:publication>
			<news:name>Iberia Intel</news:name>
			<news:language>es</news:language>
		</news:publication>
		<news:publication_date>2026-04-05T15:56:09+00:00</news:publication_date>
		<news:title><![CDATA[Amenazas de malware en 2026: evasión con IA y ataques a la cadena de suministro]]></news:title>
	</news:news>
</url>
<url>
	<loc>https://blog.iberiaintel.com/agentes-ia-automatizar-procesos-negocio-guia-completa-2026/</loc>
	<news:news>
		<news:publication>
			<news:name>Iberia Intel</news:name>
			<news:language>es</news:language>
		</news:publication>
		<news:publication_date>2026-04-05T15:52:37+00:00</news:publication_date>
		<news:title><![CDATA[Qué son los agente de IA y cómo pueden automatizar procesos de negocio (Guía completa 2026)]]></news:title>
	</news:news>
</url>
<url>
	<loc>https://blog.iberiaintel.com/que-son-agentes-ia-automatizar-procesos-negocio-guia-2026/</loc>
	<news:news>
		<news:publication>
			<news:name>Iberia Intel</news:name>
			<news:language>es</news:language>
		</news:publication>
		<news:publication_date>2026-04-05T15:50:15+00:00</news:publication_date>
		<news:title><![CDATA[Qué son los agentes de IA y cómo automatizar procesos de negocio en 2026: Guía Definitiva]]></news:title>
	</news:news>
</url>
<url>
	<loc>https://blog.iberiaintel.com/the-wave-2026-congreso-hacking-ciberseguridad-ia-espana/</loc>
	<news:news>
		<news:publication>
			<news:name>Iberia Intel</news:name>
			<news:language>es</news:language>
		</news:publication>
		<news:publication_date>2026-04-05T15:49:36+00:00</news:publication_date>
		<news:title><![CDATA[The Wave 2026: qué se espera del mayor congreso de hacking y ciberseguridad con IA en España]]></news:title>
	</news:news>
</url>
<url>
	<loc>https://blog.iberiaintel.com/cve-2026-5575-vulnerabilidad-critica-inyeccion-sql-sourcecodester-jkev-rms-10/</loc>
	<news:news>
		<news:publication>
			<news:name>Iberia Intel</news:name>
			<news:language>es</news:language>
		</news:publication>
		<news:publication_date>2026-04-05T15:45:46+00:00</news:publication_date>
		<news:title><![CDATA[CVE-2026-5575: Vulnerabilidad crítica de inyección SQL en SourceCodester jkev RMS 1.0]]></news:title>
	</news:news>
</url>
<url>
	<loc>https://blog.iberiaintel.com/como-proteger-empresa-ransomware-paso-a-paso-guia-completa/</loc>
	<news:news>
		<news:publication>
			<news:name>Iberia Intel</news:name>
			<news:language>es</news:language>
		</news:publication>
		<news:publication_date>2026-04-05T15:45:34+00:00</news:publication_date>
		<news:title><![CDATA[Cómo proteger tu empresa del ransomware paso a paso: guía completa 2025]]></news:title>
	</news:news>
</url>
<url>
	<loc>https://blog.iberiaintel.com/cve-2026-5573-vulnerabilidad-carga-archivos-technostrobe-hi-led-wr120-g2/</loc>
	<news:news>
		<news:publication>
			<news:name>Iberia Intel</news:name>
			<news:language>es</news:language>
		</news:publication>
		<news:publication_date>2026-04-05T15:44:11+00:00</news:publication_date>
		<news:title><![CDATA[CVE-2026-5573: Vulnerabilidad crítica de carga de archivos en dispositivos Technostrobe HI-LED-WR120-G2]]></news:title>
	</news:news>
</url>
<url>
	<loc>https://blog.iberiaintel.com/vibe-coding-basic-amstrad-cpc-mas-caro-typescript/</loc>
	<news:news>
		<news:publication>
			<news:name>Iberia Intel</news:name>
			<news:language>es</news:language>
		</news:publication>
		<news:publication_date>2026-04-05T15:42:32+00:00</news:publication_date>
		<news:title><![CDATA[Vibe Coding en BASIC para Amstrad CPC: por qué es más caro que en TypeScript]]></news:title>
	</news:news>
</url>
<url>
	<loc>https://blog.iberiaintel.com/que-es-el-phishing-y-como-detectarlo-guia-completa/</loc>
	<news:news>
		<news:publication>
			<news:name>Iberia Intel</news:name>
			<news:language>es</news:language>
		</news:publication>
		<news:publication_date>2026-04-05T15:40:04+00:00</news:publication_date>
		<news:title><![CDATA[Qué es el phishing y cómo detectarlo: guía completa]]></news:title>
	</news:news>
</url>
<url>
	<loc>https://blog.iberiaintel.com/presion-por-usar-ia-en-empresas-supera-ciberseguridad-riesgos/</loc>
	<news:news>
		<news:publication>
			<news:name>Iberia Intel</news:name>
			<news:language>es</news:language>
		</news:publication>
		<news:publication_date>2026-04-05T15:02:24+00:00</news:publication_date>
		<news:title><![CDATA[Por qué la presión por usar IA en empresas supera a la ciberseguridad y sus riesgos]]></news:title>
	</news:news>
</url>
<url>
	<loc>https://blog.iberiaintel.com/ingenieria-social-codigo-abierto-ataque-mantenedores/</loc>
	<news:news>
		<news:publication>
			<news:name>Iberia Intel</news:name>
			<news:language>es</news:language>
		</news:publication>
		<news:publication_date>2026-04-05T15:02:20+00:00</news:publication_date>
		<news:title><![CDATA[Ingeniería social en código abierto: cómo los hackers atacan a los mantenedores]]></news:title>
	</news:news>
</url>
<url>
	<loc>https://blog.iberiaintel.com/vulnerabilidad-react2shell-cve-2025-55182-explotada-campana-robo-credenciales/</loc>
	<news:news>
		<news:publication>
			<news:name>Iberia Intel</news:name>
			<news:language>es</news:language>
		</news:publication>
		<news:publication_date>2026-04-05T14:58:43+00:00</news:publication_date>
		<news:title><![CDATA[Vulnerabilidad React2Shell (CVE-2025-55182) explotada en campaña de robo de credenciales]]></news:title>
	</news:news>
</url>
<url>
	<loc>https://blog.iberiaintel.com/exploit-darksword-ios-18-que-es-como-actua-protegerse/</loc>
	<news:news>
		<news:publication>
			<news:name>Iberia Intel</news:name>
			<news:language>es</news:language>
		</news:publication>
		<news:publication_date>2026-04-05T14:58:02+00:00</news:publication_date>
		<news:title><![CDATA[Exploit DarkSword en iOS 18: qué es, cómo actúa y cómo protegerse]]></news:title>
	</news:news>
</url>
<url>
	<loc>https://blog.iberiaintel.com/analisis-principales-amenazas-malware-ciberespionaje-2026/</loc>
	<news:news>
		<news:publication>
			<news:name>Iberia Intel</news:name>
			<news:language>es</news:language>
		</news:publication>
		<news:publication_date>2026-04-05T14:53:54+00:00</news:publication_date>
		<news:title><![CDATA[Análisis de las principales amenazas de malware y ciberespionaje en 2026]]></news:title>
	</news:news>
</url>
<url>
	<loc>https://blog.iberiaintel.com/analisis-malware-reciente-infiniti-stealer-axios-comprometido-evasia-ia/</loc>
	<news:news>
		<news:publication>
			<news:name>Iberia Intel</news:name>
			<news:language>es</news:language>
		</news:publication>
		<news:publication_date>2026-04-05T14:52:31+00:00</news:publication_date>
		<news:title><![CDATA[Análisis de malware reciente: Infiniti Stepper, Axios comprometido y evasión con IA]]></news:title>
	</news:news>
</url>
<url>
	<loc>https://blog.iberiaintel.com/teampcp-ataques-cadena-suministro-expansion-guerra-hackers/</loc>
	<news:news>
		<news:publication>
			<news:name>Iberia Intel</news:name>
			<news:language>es</news:language>
		</news:publication>
		<news:publication_date>2026-04-05T14:47:08+00:00</news:publication_date>
		<news:title><![CDATA[TeamPCP: cómo sus ataques a la cadena de suministro se expanden con la guerra entre hackers]]></news:title>
	</news:news>
</url>
<url>
	<loc>https://blog.iberiaintel.com/grupo-chino-ta416-ataques-gobiernos-europeos-plugx-phishing-oauth/</loc>
	<news:news>
		<news:publication>
			<news:name>Iberia Intel</news:name>
			<news:language>es</news:language>
		</news:publication>
		<news:publication_date>2026-04-05T14:41:12+00:00</news:publication_date>
		<news:title><![CDATA[Cómo el grupo chino TA416 ataca gobiernos europeos con PlugX y phishing de OAuth]]></news:title>
	</news:news>
</url>
<url>
	<loc>https://blog.iberiaintel.com/cve-2026-5570-vulnerabilidad-technostrobe-hi-led-wr120-g2/</loc>
	<news:news>
		<news:publication>
			<news:name>Iberia Intel</news:name>
			<news:language>es</news:language>
		</news:publication>
		<news:publication_date>2026-04-05T14:30:21+00:00</news:publication_date>
		<news:title><![CDATA[CVE-2026-5570: Qué es, sistemas afectados y cómo mitigar la vulnerabilidad en Technostrobe]]></news:title>
	</news:news>
</url>
<url>
	<loc>https://blog.iberiaintel.com/cve-2026-5569-vulnerabilidad-control-acceso-technostrobe-hi-led-wr120-g2-sistemas-afectados-mitigar/</loc>
	<news:news>
		<news:publication>
			<news:name>Iberia Intel</news:name>
			<news:language>es</news:language>
		</news:publication>
		<news:publication_date>2026-04-05T14:28:56+00:00</news:publication_date>
		<news:title><![CDATA[CVE-2026-5569: Vulnerabilidad de control de acceso en Technostrobe HI-LED-WR120-G2 &#8211; Qué sistemas afecta y cómo mitigar]]></news:title>
	</news:news>
</url>
<url>
	<loc>https://blog.iberiaintel.com/react2shell-cve-2025-55182-como-hackers-roban-credenciales-nextjs-protegerte/</loc>
	<news:news>
		<news:publication>
			<news:name>Iberia Intel</news:name>
			<news:language>es</news:language>
		</news:publication>
		<news:publication_date>2026-04-05T14:28:16+00:00</news:publication_date>
		<news:title><![CDATA[React2Shell (CVE-2025-55182): cómo los hackers roban credenciales en Next.js y cómo protegerte]]></news:title>
	</news:news>
</url>
<url>
	<loc>https://blog.iberiaintel.com/filtracion-datos-hims-hers-zendesk-clientes/</loc>
	<news:news>
		<news:publication>
			<news:name>Iberia Intel</news:name>
			<news:language>es</news:language>
		</news:publication>
		<news:publication_date>2026-04-05T14:08:06+00:00</news:publication_date>
		<news:title><![CDATA[Qué pasó en la filtración de datos de Hims &#038; Hers Zendesk y cómo afecta a los clientes]]></news:title>
	</news:news>
</url>
<url>
	<loc>https://blog.iberiaintel.com/cve-2026-5565-vulnerabilidad-inyeccion-sql-simple-laundry-system-1-0/</loc>
	<news:news>
		<news:publication>
			<news:name>Iberia Intel</news:name>
			<news:language>es</news:language>
		</news:publication>
		<news:publication_date>2026-04-05T13:58:20+00:00</news:publication_date>
		<news:title><![CDATA[CVE-2026-5565: Vulnerabilidad de inyección SQL crítica en Simple Laundry System 1.0]]></news:title>
	</news:news>
</url>
<url>
	<loc>https://blog.iberiaintel.com/datos-ulp-no-verificados-sobrecargan-soc-comprometen-automatizacion/</loc>
	<news:news>
		<news:publication>
			<news:name>Iberia Intel</news:name>
			<news:language>es</news:language>
		</news:publication>
		<news:publication_date>2026-04-05T13:57:38+00:00</news:publication_date>
		<news:title><![CDATA[Cómo los datos ULP no verificados sobrecargan los SOC y comprometen la automatización]]></news:title>
	</news:news>
</url>
<url>
	<loc>https://blog.iberiaintel.com/cve-2026-5564-vulnerabilidad-inyeccion-sql-simple-laundry-system/</loc>
	<news:news>
		<news:publication>
			<news:name>Iberia Intel</news:name>
			<news:language>es</news:language>
		</news:publication>
		<news:publication_date>2026-04-05T13:51:12+00:00</news:publication_date>
		<news:title><![CDATA[CVE-2026-5564: Vulnerabilidad de inyección SQL en Simple Laundry System 1.0, score CVSS 7.3]]></news:title>
	</news:news>
</url>
<url>
	<loc>https://blog.iberiaintel.com/cve-2026-5562-vulnerabilidad-inyeccion-codigo-kafka-ui/</loc>
	<news:news>
		<news:publication>
			<news:name>Iberia Intel</news:name>
			<news:language>es</news:language>
		</news:publication>
		<news:publication_date>2026-04-05T13:49:11+00:00</news:publication_date>
		<news:title><![CDATA[CVE-2026-5562: Vulnerabilidad de inyección de código en Kafka-UI &#8211; Análisis y mitigación]]></news:title>
	</news:news>
</url>
<url>
	<loc>https://blog.iberiaintel.com/ataques-phishing-codigo-dispositivo-multiplican-37-como-funcionan-protegerse/</loc>
	<news:news>
		<news:publication>
			<news:name>Iberia Intel</news:name>
			<news:language>es</news:language>
		</news:publication>
		<news:publication_date>2026-04-05T13:47:34+00:00</news:publication_date>
		<news:title><![CDATA[Ataques de phishing con código de dispositivo se multiplican por 37: cómo funcionan y cómo protegerse]]></news:title>
	</news:news>
</url>
<url>
	<loc>https://blog.iberiaintel.com/cve-2026-5567-vulnerabilidad-desbordamiento-buffer-tenda-m3/</loc>
	<news:news>
		<news:publication>
			<news:name>Iberia Intel</news:name>
			<news:language>es</news:language>
		</news:publication>
		<news:publication_date>2026-04-05T13:43:15+00:00</news:publication_date>
		<news:title><![CDATA[CVE-2026-5567: Vulnerabilidad de desbordamiento de búfer en Tenda M3 1.0.0.10]]></news:title>
	</news:news>
</url>
<url>
	<loc>https://blog.iberiaintel.com/cve-2026-5566-vulnerabilidad-critica-desbordamiento-buffer-routers-utt-hiper-1250gw/</loc>
	<news:news>
		<news:publication>
			<news:name>Iberia Intel</news:name>
			<news:language>es</news:language>
		</news:publication>
		<news:publication_date>2026-04-05T13:41:56+00:00</news:publication_date>
		<news:title><![CDATA[CVE-2026-5566: Vulnerabilidad crítica de desbordamiento de búfer en routers UTT HiPER 1250GW]]></news:title>
	</news:news>
</url>
<url>
	<loc>https://blog.iberiaintel.com/ataque-axios-npm-error-falso-teams-robo-credenciales-mantenedores/</loc>
	<news:news>
		<news:publication>
			<news:name>Iberia Intel</news:name>
			<news:language>es</news:language>
		</news:publication>
		<news:publication_date>2026-04-05T13:40:55+00:00</news:publication_date>
		<news:title><![CDATA[Cómo el ataque a Axios npm usó un error falso de Teams para robar credenciales de mantenedores]]></news:title>
	</news:news>
</url>
<url>
	<loc>https://blog.iberiaintel.com/cve-2026-35616-forticlient-ems-que-sistemas-afecta-como-parchear-mitigar-riesgo/</loc>
	<news:news>
		<news:publication>
			<news:name>Iberia Intel</news:name>
			<news:language>es</news:language>
		</news:publication>
		<news:publication_date>2026-04-05T13:38:52+00:00</news:publication_date>
		<news:title><![CDATA[CVE-2026-35616 en FortiClient EMS: qué sistemas afecta, cómo parchear y mitigar el riesgo]]></news:title>
	</news:news>
</url>
<url>
	<loc>https://blog.iberiaintel.com/36-paquetes-npm-maliciosos-exploitan-redis-postgresql-desplegar-implantes-persistentes/</loc>
	<news:news>
		<news:publication>
			<news:name>Iberia Intel</news:name>
			<news:language>es</news:language>
		</news:publication>
		<news:publication_date>2026-04-05T13:30:08+00:00</news:publication_date>
		<news:title><![CDATA[36 paquetes npm maliciosos explotan Redis y PostgreSQL para desplegar implantes persistentes]]></news:title>
	</news:news>
</url>
<url>
	<loc>https://blog.iberiaintel.com/resumen-semanal-ciberamenazas-ransomware-apts-zero-days/</loc>
	<news:news>
		<news:publication>
			<news:name>Iberia Intel</news:name>
			<news:language>es</news:language>
		</news:publication>
		<news:publication_date>2026-04-05T12:37:36+00:00</news:publication_date>
		<news:title><![CDATA[Resumen Semanal de Ciberamenazas: Ransomware Qilin, APTs y Zero-Days Activos]]></news:title>
	</news:news>
</url>
<url>
	<loc>https://blog.iberiaintel.com/ingenieria-social-ciberdelincuentes-mantenedores-codigo-abierto/</loc>
	<news:news>
		<news:publication>
			<news:name>Iberia Intel</news:name>
			<news:language>es</news:language>
		</news:publication>
		<news:publication_date>2026-04-05T11:00:24+00:00</news:publication_date>
		<news:title><![CDATA[Ingeniería Social: Los Ciberdelincuentes Apuntan a los Mantenedores de Código Abierto]]></news:title>
	</news:news>
</url>
</urlset>
<!-- XML Sitemap generated by Yoast SEO -->